U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/programs-projects/future-wireless-communications-systems-and-protocols

Future Wireless Communications Systems and Protocols

5G and beyond communications will include several technical advancements that enable innovative applications such as wireless backhauling, Augmented/Virtual Reality (AR/VR), 8K video streaming and sensing. This project is focused on system-level insights and performance analyses of emerging wireless protocols and standards. Our goal is to use measurement-based models for wireless propagation in the design, the development and the evaluation of next generation wireless communications systems. We work with industry and the research community to improve the accuracy and availability of system-level modeling tools dedicated for such purposes. 

Description

Millimeter wave communication systems and protocols.

5G and beyond wireless communication systems make use of the Millimeter-Wave (mmWave) band.  While this band offers unprecedented throughput thanks to the large bandwidth available, it also suffers from larger propagation loss compared to the sub-6 Ghz band. This characteristic imposes a complete rethinking of the traditional communication paradigm, i.e., omni-directionality. Indeed, to guarantee adequate received signal power, mmWave systems employ directional beams formed by antenna arrays, i.e., beamforming. Beamforming focuses the power (both in transmission and in reception) towards the chosen direction by properly steering the antenna elements of the antenna array. 

The directionality of the communication poses a number of new challenges, including : 

Beamforming requires to select (Beamforming Training) and adapt (Beamforming Tracking) the directional beams to use between two nodes that are willing to communicate. Beamforming Training and Tracking is of paramount importance for mmWave communications as it drives the performance of the communication links. The initial approach, introduced in IEEE 802.11ad and 3GPP release 15, has been to perform an exhaustive search among all the possible beams combinations. However, there are obvious scalability issues with this approach, especially in the context of MIMO systems. Therefore more efficient beamforming Training/Tracking algorithms are needed.   

Most wireless and application protocols have been designed with omnidirectional communications in mind. on the other hand, highly directional communications will impose drastic changes on radio-resource allocation schemes in order to take full-benefits of the directionality of the communication. 

The usage of multiple antennas to compensate for the high propagation loss, enables the PHY to exploit spatial multiplexing techniques to achieve even greater throughput. The design of MIMO precoding and equalization algorithms requires channel estimation techniques tailored to the mmWave propagation characteristics.  

A realistic platform that accurately characterizes the propagation environment is vital to evaluate and develop efficient beamforming, radio-resource allocation and channel estimation algorithms and models, as well as antenna array systems that will address these challenges. Until now, research and development has been conducted separately using tools and platforms that are not integrated and generally not compatible. This presents a major impediment to the development and deployment of future generation millimeter wave systems. Our response is to develop a realistic platform that includes accurate characterization of the channel propagation environment: The Quasi-Deterministic (Q-D) Framework. 

Quasi-Deterministic (Q-D) Framework  

From the raytraced channel to the beamforming training visualization

While the development of standard specifications for IEEE 802.11ad/ay is complete, innovative research using IEEE 802.11ad/ay devices is still challenging due to the prohibitive cost of test-bed equipment and the lack of open-source and flexible platforms. The NIST Q-D framework aims to overcome some of these challenges by providing researchers in the mmWave community a set of high-fidelity tools to evaluate and better understand the inter-workings of the IEEE 802.11ad/ay protocols.  

Evaluating performance end-to-end often requires the following: 

An accurate representation of the channel model at 60 GHz. 

A flexible and high-fidelity antenna model.  

PHY model and digital baseband transceiver PHY abstractions. 

A system-level simulator that implements the MAC and PHY specifications of IEEE 802.11ad/ay and that includes realistic channel models, antenna models, and PHY layer abstractions.  

The NIST Q-D framework

To this end, we developed in collaboration with IMDEA and the University of Padova five different open-source tools as displayed in Figure 1.  

The NIST Q-D Channel Realization Software 1 : This Matlab tool implements the channel between nodes/antennas pairs in the network using ray tracing and Q-D methodology ( link ). The channel is described through the Multi-Path Components (MPCs) properties such as number of MPCs, path loss, delay, angles of arrival and departures. User can define its own 3D environment and nodes mobility/rotations. This software includes a visualizer to display the generated MPCs between each pair of nodes. 

The Codebook Generator 2 : This Matlab tool generates Phased Antenna Arrays properties such as steering vectors and Antenna Weight Vectors based on user-defined Phased Antenna Arrays characteristics (geometry, number of elements, etc.).  

The Integrated Sensing and Communication Physical Layer Model 3 : This tool is a Matlab implementation enabling baseband link-level simulation of millimeter-wave (mm-wave) wireless communication and sensing systems. ISAC-PLM models the Physical Layer (PHY) of IEEE 802.11ay, including a growing set of features, such as Multi-User Multiple-Input Multiple-Output (MU-MIMO) link level simulation, IEEE 802.11ay single carrier (SC)/orthogonal frequency-division multiplexing (OFDM) waveform generation, synchronization, channel estimation, carrier frequency offset (CFO) estimation and correction. It provides an end-to-end simulation platform, including transmitter and receiver, importing the channel realized by the Q-D Channel Realization Software.   The software allows to compute several metrics, such as bit error rate, packet error rate, target range and target velocity estimation accuracy.  It can be used to export lookup tables of packet error rate varying SNR, in AWGN or mm-wave channel, for different modulation and coding schemes.

The ns-3 802.11ad/ay with Q-D channel implementation 4 : The ns-3 system-level simulator has been modified to include IEEE 802.11ad/ay functionalities. Our implementation imports the channel realized by the NIST Q-D Channel Realization Software, the antenna characteristics produced by the Codebook Generator, and includes the PHY layer abstraction by the NIST 802.11ay PHY to obtain high-fidelity system-level evaluation.  

The NIST Q-D Interpreter 3 : IEEE 802.11ad/ay system-level performance highly depends from the beamforming applied at the transmitter/receiver side. To help interpretation of the beamforming training results, we developed a python 3D visualizer that takes as an input the beamforming results obtained in ns-3 and displays the antenna patterns for a transmitter/receiver communication.  

____________________________________________________________________

  • Developed by NIST in collaboration with University of Padova SIGNET Group
  • Developed by IMDEA WNG Group
  • Developed by NIST
  • Developed by IMDEA WNG Group in collaboration with NIST

Integrated Communication and Sensing Systems

Sensing and communication systems are competing technologies, sharing the same spectrum and using similar hardware components. The idea of Integrated Sensing And Communication (ISAC) systems has recently gained the attention of research and standardizations communities. Co-designing sensing and communication systems allows to efficiently re-use the spectrum and the hardware resources, for example reusing the communication waveforms and devices to enable sensing applications. For this reason, integrated communication and sensing has been identified as an enabling technology for 5G/6G, and the next-generation Wi-Fi system.

The ubiquitous presence of WiFi devices in our everyday life offers a unique opportunity to enable innovative applications such as presence detection, gesture recognition, or person identification, re-using existing WiFi devices. IEEE has recently (September 2020) started a new task group, TGbf, to extend the current IEEE 802.11ay high throughput functionalities, with cm-level sensing resolution.

IEEE 802.11bf envisions to enable sensing for a wide range of applications such as gesture recognition, number of persons in a room, breathing activity, etc. The requirements for these applications can be vastly different, e.g., detect an object proximity requires less amount of information and accuracy compared to detect a person and identify its pose.

The design of integrated communication and sensing systems poses several challenges including:

  • Resource allocation: The sensing accuracy performance will be strongly dependent on the availability and update frequency of the channel measurements. However, as IEEE 802.11bf re-uses the communication link, sending and exchanging sensing information can be solely seen as an overhead from a WiFi performance point-of-view, reducing throughput and increasing latency. In this case, the larger the overhead, the better the sensing accuracy will be at the cost of a lower transmission data rate.
  • Cooperation and scheduling:  cooperative sensing (CSENS) is foreseen as a key enabler of high-resolution sensing. CSENS will use multiple sensing devices collaborating to capture additional information about the surrounding environment (e.g., in case of blockage between a sensing device and a target, another sensing device could still be able to sense the target). CSENS will also incur additional overhead as it will not only require more entities in the sensing framework but will also raise new challenges such as synchronization between the multiple entities, establishment of a distributed sensing measurements, fusion of partial sensing information, etc.
  • Beamforming training at mm-wave: the optimization of the beamforming training to maximize the communication performance creates very narrow beams. The limited field of view does not allow to have sense the entire environment.

The NIST ISAC Framework  

The Q-D channel model realization software will be used as a baseline to create the NIST ISAC Channel Realization software by introducing the concept of targets, i.e., person or object to sense. While the NIST ISAC Channel Realization software can support different target models, our current study focus on human targets, which can enable several applications such as presence detection and localization.  The human motion is modeled with kinematic models, which approximate the human body as a collection of joints. The NIST 802.11ay PHY is enhanced with dedicated ISAC sensing signal processing to obtain range-doppler information, which allows the detection of moving objects. Finally, the NIST Q-D interpreter is extended to allow the visualization of the interaction between the wireless signal and the human target, while displaying the correspondent range-doppler map.

PUBLICATIONS

Beamforming training.

  • M. Kim, T. Ropitault, S. Lee, N. Golmie, H. Assasa, and J. Widmer, "A Link Quality Estimation-based Beamforming Training Protocol for IEEE 802.11 ay MU-MIMO Communications", in IEEE Transactions on Communications, Vol. 69, No. 1, January 2021. 
  • M. Kim, T. Ropitault, S. Lee and N. Golmie, "Efficient MU-MIMO Beamforming Protocol for IEEE 802.11ay WLANs", in IEEE Communications Letters, Vol. 22, No. 1, January 2019. 
  • Y. Kim, S. Lee and T. Ropitault, "STS Adaptation for Beamforming Training of Asymmetric Links in IEEE 802.11ay-based Dense Networks", in Proceedings of IEEE Vehicular Technology Conference (VTC Spring 2020), June 2020. 
  • Y. Kim, S. Lee, and T. Ropitault, "Adaptive Scheduling for Asymmetric Beamforming Training in IEEE 802.11ay-based Environments", in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2019), April 2019. 

PHY Layer Evaluation

  • J. Zhang, S. Blandino, N. Varshney, J. Wang, C. Gentile and N. Golmie, "Multi-User MIMO Enabled Virtual Reality in IEEE 802.11ay WLAN," 2022 IEEE Wireless Communication and Networking Conference.
  • A. Bodi, J. Zhang, J. Wang, and C. Gentile, " Physical-Layer Analysis of IEEE 802.11ay using a Channel Fading Model from Mobile Measurements", in IEEE  International Conference on Communications (ICC 2019), May 2019. 
  • N. Varshney, J. Zhang, J. Wang, A. Bodi and N. Golmie, "Link-Level Abstraction of IEEE 802.11ay based on Quasi-Deterministic Channel Model from Measurements," in Proc. of 2020 IEEE Vehicular Technology Conference (VTC2020-Fall), April 2020.  
  • S. Blandino, T. Ropitault, A. Sahoo and N. Golmie, "Tools, Models and Dataset for IEEE 802.11ay CSI-based Sensing," 2022 IEEE Wireless Communication and Networking Conference.

T. Ropitault, S. Blandino, N. Varshney and N. Golmie, "Q-D simulation & Modeling framework for sensing", presented at TGbf.

S. Blandino, T. Ropitault, N. Varshney and T. Ropitault, "A preliminary channel model using raytracing to detect human presence", presented at TGbf

Hybrid MAC Performance

  • C. Pielli, T. Ropitault, N. Golmie, and M. Zorzi, “An analytical model for CBAP allocations in IEEE 802.11ad,” in IEEE Transactions on Communications, vol. 69, no. 1, 2021.
  • J. Chakareski, M. Khan, T. Ropitault, and S. Blandino, “6DOF virtual reality dataset and performance evaluation of millimeter wave vs. free-space-optical indoor communications systems for lifelike mobile VR streaming,” in 2020 54th Asilomar Conference on Signals, Systems, and Computers, 2020.
  • T. Azzino, T. Ropitault and M. Zorzi, "Scheduling the Data Transmission Interval in IEEE 802.11ad: A Reinforcement Learning Approach," 2020 International Conference on Computing, Networking and Communications (ICNC), May 2020. 
  • C. Pielli, T. Ropitault, and M. Zorzi    "The Potential of mmWaves in Smart Industry: Manufacturing at 60 GHz", in International Conference on Ad-Hoc Networks and Wireless, AdHoc Now 2018, pp. 64-67. 

The Q-D framework

  • H. Assasa, N. Grosheva, T. Ropitault, S. Blandino, N. Golmie, and J. Widmer, “Implementation and evaluation of a wlan IEEE 802.11ay model in network simulatorns-3,” in Proceedings of the Workshop on Ns-3, WNS3 ’21, (New York, NY, USA), 2021.
  • H. Assasa, T. Ropitault, S. Lee and N. Golmie, "Enhancing the ns-3 IEEE 802.11ad Model Fidelity: Beam Codebooks, Multi-Antenna Beamforming Training, and Quasi-Deterministic mmWave Channel", in Workshop on ns-3 (WNS3 2019), June 2019. 
  • H. Assasa, J. Widmer, J. Wang, T. Ropitault, and N. Golmie, "An Implementation Proposal for IEEE 802.11 ay SU/MU-MIMO Communication in ns-3", in Workshop on Next-Generation Wireless with ns-3 (WNG 2019), June 2019 
  • H. Assasa, J. Widmer, T. Ropitault, A. Bodi, and N. Golmie, "High Fidelity Simulation of IEEE 802.11 ad in ns-3 Using a Quasi-deterministic Channel Model", in Workshop on Next-Generation Wireless with ns-3 (WNG 2019), June 2019 

Ultra-Dense networks

  • M. Kim, T. Ropitault, S. Lee and N. Golmie, "A Throughput Study for Channel Bonding in IEEE 802.11ac Networks," in IEEE Communications Letters, vol. 21, no. 12, pp. 2682-2685, Dec. 2017. 
  • T. Ropitault and N. Golmie, "ETP algorithm: Increasing spatial reuse in wireless LANs dense environment using ETX," 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 
  • T. Ropitault, "Evaluation of RTOT algorithm: A first implementation of OBSS_PD-based SR method for IEEE 802.11ax," 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) 

Major Accomplishments

  • Participating in IEEE working groups (TGay, TGbf).
  • Over 20 peer-reviewed publications on the evaluation and improvement of IEEE 802.11ax/ad/ay.
  • Developed (in collaboration with IMDEA) the first open-source ns-3 IEEE 802.11ay implementation. Main features include MIMO Beamforming Training and Quasi-Deterministic propagation model

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • My Account Login
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Perspective
  • Open access
  • Published: 15 February 2023

Wireless communications sensing and security above 100 GHz

  • Josep M. Jornet   ORCID: orcid.org/0000-0001-6351-1754 1 ,
  • Edward W. Knightly 2 &
  • Daniel M. Mittleman   ORCID: orcid.org/0000-0003-4277-7419 3  

Nature Communications volume  14 , Article number:  841 ( 2023 ) Cite this article

7769 Accesses

30 Citations

1 Altmetric

Metrics details

  • Fibre optics and optical communications
  • Terahertz optics

The field of sub-terahertz wireless communications is advancing rapidly, with major research efforts ramping up around the globe. To address some of the significant hurdles associated with exploiting these high frequencies for broadband and secure networking, systems will require extensive new capabilities for sensing their environment and manipulating their broadcasts. Based on these requirements, a vision for future wireless systems is beginning to emerge. In this Perspective article, we discuss some of the prominent challenges and possible solutions which are at the forefront of current research, and which will contribute to the architecture of wireless platforms beyond 5G.

Similar content being viewed by others

research issues in wireless communication

Secure space–time-modulated millimetre-wave wireless links that are resilient to distributed eavesdropper attacks

research issues in wireless communication

What should 6G be?

research issues in wireless communication

Metasurface-enabled smart wireless attacks at the physical layer

Introduction.

Over the last two decades, wireless communications exploiting radio-frequency waves have become a ubiquitous feature of modern life. With each subsequent advance in technology has come countless new tools and capabilities, transforming the way we live. Now, as the rollout of 5G systems continues, researchers are considering the design of subsequent generations of networks, as well as visions for future implementations of Wi-Fi, Bluetooth, and other short-range wireless systems. It is worth noting that most previous wireless platforms, from the days of Marconi, have been confined to operate in the frequency range below a few gigahertz. Yet, rapid growth in demand for wireless services has changed the game; we are now forced to consider using higher frequencies, in order to find the bandwidth needed to support continued exponential growth in wireless traffic. One of the novel features of modern Wi-Fi and 5G variants such as IEEE 802.11ay 1 involves their ability to access higher frequencies in the millimeter-wave range, above 10 GHz. As these systems mature, it is therefore natural that research interests have now begun to turn to even higher frequencies. Like the mmWave Wi-Fi and 5G bands, the use of these higher frequencies is motivated in large part by the desire for access to larger bandwidth, and the associated higher data rates. Indeed, although the maximum data rate that can be supported within the 5G standard exceeds 7 gigabits per second (Gbps), more than an order of magnitude larger than the fastest 4G data rate, the huge (and ongoing) growth in demand for wireless access has made it clear that even higher rates will be needed in the future 2 .

For this reason, the cutting edge of wireless research lies at frequencies above 100 GHz 3 , often referred to as the “terahertz (THz) range”. Most of this research is focused on a few specific broad spectral bands, including the waveguide D band (110−170 GHz) which has been previously employed for television broadcasts during the Beijing Olympics 4 , and the higher frequency bands defined by the recent IEEE 802.15.3d standards document (252−322 GHz) 5 . These frequencies are well beyond even the highest millimeter-wave bands included in today’s Wi-Fi and 5G standards.

Opening this relatively unexplored realm of the electromagnetic spectrum will involve a host of challenging new research problems. In this Perspective article, we discuss some of the interesting issues facing researchers in the race to develop ultra-high-frequency wireless systems. Many of these challenges are associated with aspects of the physics of the interaction of these high-frequency waves with the world. Above 100 GHz, system designers will need to consider some physical regimes that have not previously been relevant for legacy wireless systems, or even in some cases for the mmWave bands of 5G. We first consider a few of the more prominent issues associated with these new operating regimes. We note that near-infrared or visible light optical communication systems, operating at even higher frequencies, are also of significant research interest, but are beyond the scope of this article.

Some challenges

One aspect of this discussion can be understood from the Friis equation, which describes the power received by an antenna P RX in a line-of-sight point-to-point wireless link. Expressed in dB, this relation is:

Here, P TX is the power generated by the transmitter, G T and G R are the transmitter and receiver antenna gains respectively (in dBi), and the last term, the free-space path loss (FSPL), describes the decrease in power per unit area of an expanding electromagnetic wavefront in terms of the propagation distance D and the wavelength λ 6 . This term becomes dominant at high frequencies. When considering an increase in the frequency by a factor of 100 (for example, from the typical 4G cellular frequency of 2.8 GHz to 280 GHz, a frequency in the 802.15.3d standard), the FSPL increases by 40 dB (see Fig.  1 ). Because the FSPL is smaller at lower frequencies, high-gain antennas are not always required; it is possible to operate a wireless link in which the transmitter broadcasts to a wide range of angles. For example, typical cellular antennas often span a 120° broadcast sector. At higher frequencies, the increasing FSPL can be offset with high-gain antennas, which concentrate the radiated power into a smaller angular range. Above 100 GHz, these broadcasts begin to act more like beams, propagating in a well-defined direction with low divergence 7 . There are of course many possible options for high-gain antennas, but translating these to the THz range is not always trivial, due to (among other things) the requirement of broadband operation. For example, phased array antennas are a well-established technology at lower frequencies, employing tuned phase shifters for each of the antenna elements in an array to implement beam steering or wavefront shaping. This approach, also being used in 5G systems, becomes more challenging as we design systems with larger fractional bandwidths. Phase shifters commonly operate at a fixed wavelength or frequency. When injecting a broadband signal to a phase shifter, the different frequency components experience different phases, resulting in beam squinting. Instead, a true-time-delay operation, in which all the signal frequency components experience the same phase delay, may be required in place of a simple phase shifter for individual elements of an antenna array 8 . The design of active efficient high-gain antennas with suitable form factors and efficiency remains an important research challenge.

figure 1

The attenuation of a propagating radio wave due to both free-space path loss and atmospheric absorption, for an assumed propagation distance of 100 m, at a temperature of 15 °C and relative humidity of 59%, using a standard atmospheric model (see [10, 11]). The shaded areas indicate the range of frequencies corresponding to legacy wireless systems, the 5G millimeter-wave range, and the THz spectrum. The hatched areas are the two bands of significant interest for communications mentioned in the text.

A second important distinction between low and high-frequency propagation involves atmospheric attenuation (which has been neglected in Eq. ( 1 ) above). This loss also increases with frequency, in the form of several spectrally narrow absorption peaks riding on top of a smoothly increasing continuum absorption. In terrestrial systems, all of the important absorption lines above 120 GHz are due to rotational and ro-vibrational excitations in gas-phase water molecules 9 , 10 , some of which are strong enough to inhibit long-range propagation for frequencies near their line centers. These discrete absorption lines, therefore, serve to break the spectrum up into a series of broad bands which are well suited for transmission over longer distances, in which the relatively small continuum background (due to water dimers and other species) is the dominant contribution to atmospheric loss 11 . In fact, these absorption resonances need not always be considered a hindrance; with careful frequency tuning, they can be exploited for enhanced wireless security 12 . Despite some older conventional wisdom, the atmosphere is not opaque to radiation in the 100–1000 GHz range; if the H 2 O lines are avoided, point-to-point links in the km range are certainly feasible 4 , 13 , 14 , 15 . Inclement weather also contributes additional loss; 16 , 17 however, these may be tolerable under certain conditions, and indeed terahertz beams appear to be more robust against atmospheric scintillation and certain weather conditions (e.g., fog) than, for example, free-space optical signals in the near-infrared 18 .

A third issue of note is of the roles of scattering from surfaces and of material absorption. When considering interactions with surfaces, the characteristics of the scattered field are determined by the roughness of the surface, in comparison with the wavelength of the radiation, as well as the extent to which the surface absorbs (rather than scatters) the incoming radiation. A smooth (compared to lambda) surface reflects like a mirror; a rough surface produces a diffuse (not strongly directional) scattered wave. In a typical indoor environment, for instance, conventional wireless systems operate at frequencies where absorption is low in many materials, and where many surfaces are smooth compared to the (longer) wavelength. So, it is generally assumed that there can be many multiply-scattered paths between the transmitter and receiver, producing a rich scattering environment in which the field at any location is a stochastic superposition of many different wavelets. In contrast, the wireless channel at THz frequencies is quite different 19 . Typically a propagating wave experience much higher attenuation when interacting with most surfaces, due to absorption losses in the materials 20 , and commonly encountered surfaces can either be smooth or rough, in comparison with the (much smaller) wavelength (see Fig.  2 ). As a result, both indoor 21 and outdoor 22 environments are typically much more sparse, with fewer paths connecting the transmitter to receiver. Because many surfaces are smooth enough to act like mirrors, scattering in a specular direction (i.e., angle of reflection = angle of incidence) can often be dominant. Researchers have therefore been able to exploit ray tracing as an accurate means for predicting and understanding signal paths in THz propagation simulations 21 , 23 . In addition, due to the opacity of many objects including people, issues such as blockage of the direct line-of-sight (LOS) path can pose challenges for maintaining connectivity, as would be the case with a laser-based free-space optical link. However, due to the millimeter-scale wavelength, steering around such blockage events by exploiting a specular reflection from a surface in the environment is more feasible at THz frequencies 24 . Even non-specular reflections (diffuse scattering from rough surface 25 ) can be employed to maintain a link, although obviously with a lower signal-to-noise ratio 26 and added dispersion 27 . The shift from omnidirectional broadcasts with rich scattering to directional beams with sparse paths also has important implications for the security of such communication channels, rendering eavesdropping more challenging. Yet, vulnerabilities due to scattering still remain 28 , 29 , 30 , and must be considered in system design.

figure 2

Measured bit error rate (BER) for a 2-m link which incorporates a specular reflection from a cinderblock wall, as shown in the top left photo. The effects of absorption and scattering are separated by measuring the link on the bare wall (blue points), the same wall with a conformal metal foil coating that eliminates penetration into the cinderblock (red points), and a flat metal plate which eliminates both absorption and scattering (black points). The photo images in ( a ) depict the three situations corresponding to the measurements in ( b ). Reprinted from Ma, J., Shrestha, R., Moeller, L. & Mittleman, D. M.; Channel performance of indoor and outdoor terahertz wireless links. APL Photon. 3, 051601 (2018)., with the permission of AIP Publishing.

Defining wavefronts and waveforms

These various novel features of THz waves force us to rethink common practices in wireless communication systems and, at the same time, open the door to new strategies not available in traditional wireless networks in microwave and even millimeter-wave bands.

On the one hand, relating to the spatial behavior of terahertz radiation, the requirement for high-gain directional antennas strongly suggests the use of radiating structures that are much larger than the wavelength. By recalling that the far field of an antenna occurs for distances greater than 2 × D 2 /λ, where D is the antenna’s largest dimension, it is likely that many wireless systems at terahertz frequencies will operate in the near field. For example, a 10 cm antenna, such as a dish antenna or an antenna array, at 130 GHz has a far-field distance of 8.6 m and the same antenna size at 300 GHz has a far-field distance of 20 m, larger than many indoor environments in which a THz LAN could be employed. This is a major distinction from lower frequency wireless systems, which generally operate exclusively in the far field.

This result has multiple consequences. First, wireless propagation, channel, and multi-user interference models, which have been derived under the assumption of far-field operation 6 , cannot simply be repurposed for higher frequency systems. Indeed, many models for terahertz communications continue to neglect to capture near-field effects 31 . Second, most algorithms behind the control of smart directional antenna systems, including beamforming and beam-steering, have also generally been developed under the far-field assumption 32 . For many possible antennas, including large radiating structures such as the increasingly popular intelligent surfaces 33 , this is not the case even at lower frequencies.

To overcome this latter challenge, there are several recent works 34 , 35 that explore beam focusing as a way to achieve beamforming-like capabilities but in the near field. In beam focusing, the weights or phases at different antenna elements are set to emulate that of a dielectric lens. While this is a valid solution for static scenarios, tracking and constantly changing the point on which the signal needs to be focused results in a significant overhead in terms of signaling the channel state information.

Going beyond beam focusing, if we are ready to abandon common practices and assumptions such as that the generated signal can be approximated as a plane wave or a Gaussian directional beam, operating in the near field opens the door to a host of new possibilities in wavefront engineering (whereby wavefronts we refer to the spatial intensity and phase profiles of the signals being transmitted). Although many of these ideas have been considered for some time, for instance in the optics community, it is only with the advent of directional links that they may reach their full potential in wireless systems. For example, at lower frequencies where received signals can often contain rich multi-path components, it can be challenging to exploit polarization diversity to double channel capacity. In contrast, such strategies are likely to be far more effective with a line-of-sight directional link 36 .

Other important examples may arise from considerations of more exotic wavefronts which can be prepared in the near field of an emitting aperture. For instance, by adopting Bessel beams, i.e., beams whose intensity profile in space can be described by a Bessel function of a certain order 37 , a beam can focus (in the near field) not at a point but along a line. This can drastically simplify the operational requirements in mobile networks. Moreover, Bessel beams exhibit a self-healing property, i.e., even when partially blocked by an obstacle, they can recreate the original intensity and phase profile at a distance. Similarly, the use of accelerating beams such as Airy beams, which can be programmed at the origin to bend after a given number of wavelengths 38 , can also be utilized to overcome or minimize the impact of obstacles, a major problem for practical mobile terahertz communications and sensing systems. Figure  3 shows computed cross-sections of a few of these options, illustrating the dramatically different behavior that can be obtained in the near field of a transmitting aperture.

figure 3

Calculated electric field (left) and intensity (right) patterns for three engineered near-field radiation patterns: a focused Gaussian beam (top), a Bessel beam (middle), and an accelerating Airy beam (bottom).

Further, all these beams can also be engineered to carry orbital angular momentum (OAM). Different OAM mode orders are orthogonal, enabling the multiplexing of streams at the same frequency, at the same time, and in the same direction 39 . As discussed in the literature 40 , OAM multiplexing can be seen as a particular case of multiple input multiple output (MIMO) communications, but one in which channels are orthogonal from the start (and not because of how multi-path propagation affects them). Moreover, while these wavefronts can be generated using static phase masks (such as axicons for Bessel beams or spiral phase plates for different OAM modes), the same can be achieved by the utilization of dense antenna arrays 41 , 42 , which (unlike phase masks) could also in principle be dynamically reconfigurable 43 , 44 . We note that the security vulnerabilities associated with using such unusual wavefronts could be quite different from those associated with conventional side-lobe eavesdropping or jamming attacks 45 , and could offer new opportunities for enhancing link security 46 .

On the other hand, relating to the frequency behavior of terahertz radiation, there is a need for waveforms, the temporal variations of the transmitted signals, that can overcome various challenges, including those introduced by frequency-dependent molecular absorption in the channel (see Fig.  1 ) and by increasingly prominent hardware imperfections (e.g., nonlinearities in broadband frequency up- and down-converting systems). As of today, there is no answer to the question of what waveform will be used for 6G terahertz systems. While the common solutions at lower frequencies, including orthogonal frequency division modulation/multiplexing (OFDM), single-carrier OFDM also known as DFT spread OFDM, or the recently proposed orthogonal time-frequency-spatial modulation (OTFS) 47 could be adapted to terahertz frequencies, there are also other options, including waveforms unique to the terahertz band that enable applications not available at lower frequencies. For example, very short pulses, just a few hundreds of femtoseconds long, as in terahertz time-domain spectroscopy (THz-TDS) platforms 48 or BiCMOS impulse radiators 49 , can be utilized to implement low-complexity non-coherent modulation which is able to support a large number of users transmitting at very large data rates over a short range, provided that proper equalization techniques are implemented to compensate for the effects of multi-path propagation 2 , 50 . This is particularly useful when the encoding purposely biases the transmission of zeros over the transmission of ones to overcome the impact of noise and interference. At the same time, for longer communication distances, the broadening of the molecular absorption lines results in narrower communication bandwidths at longer distances. This effect can be exploited to use the channel as a filter and help to separate simultaneous data streams at the same frequency for users in the same direction but at different distances (see Fig.  4 ) 51 . Moreover, if spectral efficiency and peak data rates are not the drivers, there are other ways to exploit the available bandwidth above 100 GHz, for example in the form of secure communication and spectrum sharing techniques based on ultra-broadband spread spectrum 52 .

figure 4

Leveraging the spectral filtering effect of atmospheric water vapor absorption resonances to implement hierarchical bandwidth modulation, in which nearby users can access the full bandwidth of the transmitted signal, while more distant users, whose channel bandwidth is narrower, only employ the smaller range at the center of the spectrum.

Ultimately, we envision that the spatial and spectral aspects of terahertz signals should not be considered separately, but instead, the spatial wavefront and temporal waveform should be jointly designed to optimize the performance of systems and unleash this spectrum. For example, as discussed above, different wavefronts are commonly generated with different types of phase masks which can be, in some cases, intrinsically narrowband. However, when trying to transmit ultra-broadband signals through such structures, the resulting wavefronts are far from ideal. To prevent this, frequency-selective pre-distortion of the waveforms being transmitted can be employed to ensure that the desired wavefront is produced over the entire bandwidth. This becomes even more important when producing complex wavefronts using arrays that approximate the lens response with a discrete (rather than continuous) pattern.

Components for the physical layer

Of course, the impact of the unique properties of terahertz radiation does not end with propagation, wavefronts, and waveforms. It will also influence the redesign of common devices in traditional systems for operation at higher frequencies and will open the door to novel hardware solutions that are not practical or even possible at lower frequency bands.

As one example, the small wavelength of terahertz waves leads to small fundamental resonant antennas (e.g., dipole, slots, or patches). When used individually, these antennas exhibit low effective areas resulting in the very high spreading losses discussed above. However, it is this small size of radiating structures that allows us to integrate very large numbers of antennas in a very small footprint. For example, in a 10 cm × 10 cm footprint, one could in principle integrate 200 × 200 (40,000!) dipole antennas at 300 GHz spaced λ/2 apart. The fabrication of such large on-chip arrays is a significant challenge, but rapid progress is being made 43 , 44 .

While such antennas or radiating elements can be envisioned, there are other components besides the antennas that would need to be integrated into the chip (potentially through 3D stacking), depending on the application that is needed. For example, a true-time delay controller per element would be needed to engineer the aforementioned broadband wavefronts. Moreover, if the goal were to develop transmitting or receiving antenna arrays that can support MIMO communications, each antenna would require a complete RF chain (i.e., a local oscillator, mixer, filter, amplifier, and data converter). Integrating such arrays is a major bottleneck with today’s electronic and photonic transceiver technologies due to their size, as well as packaging and thermal constraints. Arrays with element spacing greater than λ/2 produce far-field radiation patterns with grating lobes, which could be leveraged for multi-beam systems, but are otherwise not desirable. Instead, antenna array architectures aimed at minimizing the number of RF chains while minimally impacting the array capabilities have been proposed, such as the array-of-sub-arrays architecture 47 , in which separate RF chains drive separate subsets of fixed or only phase-controlled antenna elements 53 . Other solutions could be the adoption of signal processing techniques for sparse antenna arrays, which so far have generally been used only in the context of imaging 54 , 55 .

There are also a number of new technologies that only become available when operating at terahertz frequencies (or above). For instance, researchers have proposed the use of graphene to build plasmonic transceivers and antennas that intrinsically operate in the terahertz band 56 . Graphene, which supports the propagation of surface plasmon polariton (SPP) waves at terahertz frequencies and at room temperature, can be used (1) as a two-dimensional electron gas where plasma waves oscillations at terahertz frequencies occur 57 , (2) as a plasmonic waveguide where the properties of SPP waves can be electrically tuned 58 , and (3) as the active element of a nano-patch antenna, able to convert SPP waves into free-space electromagnetic waves 59 , all with devices that are significantly smaller than the free-space wavelength. While being sub-wavelength in size leads to low radiation efficiencies, this can be compensated through dense integration of the elements. Moreover, the sub-wavelength nature of each radiator also leads to negligible mutual coupling as long as elements are placed more than a plasmonic wavelength apart. From a signal processing perspective, being able to sample space with a resolution higher than λ/2 leads to both oversampling gain and the ability to engineer wavefronts (such as those noted above) with much higher accuracy than traditional λ/2-spaced arrays could ever support 60 .

The shift to higher frequencies also offers fascinating opportunities to engineer devices with advanced functionality, which are either impossible or impractical at lower frequencies. For example, recent research has focused on leaky-wave antennas, based on guided wave devices which incorporate a mechanism to permit some fraction of the guided wave to ‘leak’ out into free space. This leaked signal manifests a strong coupling between the frequency of the radiation and the direction in which it propagates. Leaky-wave antennas are neither new nor exclusive to the terahertz range 61 . However, the wavelength scale, and spectral bandwidth, of signals at these high frequencies means that such devices can operate in a unique regime of form factor and functionality, such that it is now plausible to consider new roles for these components in wireless systems. Leaky-wave components can be valuable for multi-frequency signal distribution (i.e., multiplexing) 62 and for sensing tasks such as the radar-like location of objects within a broadcast sector 63 . If both transmitter and receiver are equipped with a leaky-wave antenna, they can together provide a fast and efficient method for simultaneously determining both the angular location of a mobile receiver and its angular rotation relative to the transmitter 64 . Building on this approach, recent work has demonstrated arrays with true-time-delay elements to accomplish similar localization tasks 65 . One could even envision creating arrays of leaky-wave devices for enhanced wavefront control. This is another idea which has previously been considered at lower frequencies 66 , but which could find new possibilities in a different frequency regime.

The challenging propagation of terahertz waves and, in particular, the issue of blockage, motivates the consideration of strategies to improve reliability. As noted above (see Fig.  2 ), non-line-of-sight paths are available, even at these high frequencies, although they are sparse relative to what is typically encountered at lower frequencies. One interesting approach relies on the development of devices that can help us engineer not only the transmitter and receiver but also the propagation environment (i.e., the channel). This idea has inspired a great deal of research in the general area of intelligent reflecting surfaces, which could be distributed throughout an indoor network to facilitate signal distribution and overcome transient blockage events. As with other devices discussed here, an intelligent reflecting surface (IRS), such as those based on programmable reflectarrays, has been considered previously at lower frequencies 67 . However, at frequencies above 100 GHz and with current applications in mind, the benefits that such structures bring to wireless systems may now prove too valuable to ignore. Today, there are numerous different technologies under consideration as the basis for IRS devices. For example, smart surfaces have been proposed which replace conventional switching elements employed at lower frequencies, such as varactor diodes, with graphene patches 56 . Dense reflectarrays with integrated switching elements have been designed and implemented in silicon CMOS 43 , 44 and in III-V semiconductor platforms using high-electron-mobility transistor (HEMT) structures 68 . We have also recently shown that array devices, in the hands of a clever adversary, can also open up interesting new security vulnerabilities (see Fig.  5 ) 69 . It is too early to tell how this interesting approach to engineering the broadcast environment will ultimately be achieved, but it is quite clear that any of these possible solutions would drastically change the way that networks are designed and operated.

figure 5

A clever eavesdropper (Eve) can insert an engineered reflector, such as a flexible metasurface (photo) into the line-of-sight path between the transmitter (Alice) and the intended receiver (Bob), in order to direct a portion of the spectrum towards the eavesdropper (upper schematic). This low-profile attack would be difficult for Alice and Bob to detect, but would direct a significant signal toward Eve (lower panel).  Adapted from Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel Mittleman, and Edward Knightly. 2022. Metasurface-in-the-middle attack: From Theory to Experiment. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22).© Association for Computing Machinery, New York, NY, USA, 257–267. https://doi.org/10.1145/3507657.3528549 .

Implications for the control plane

With the above considerations in mind, it becomes clear that networks of the future, which have the capability to exploit THz frequency bands, will operate quite differently from networks of today. One obvious example is that a transmitter, employing a narrow pencil-like beam, will need to know where to point it. This and other examples suggest that networks will require joint communications and sensing capabilities, and moreover that new approaches will be required for managing these capabilities in order to ensure high quality of service and efficient use of system resources.

As a first step, we note that radio sensing can have two purposes: The first purpose is to identify clients, devices, and objects in the environment, e.g., for presence detection and analysis of environmental objects and their mobility to optimize the signal-to-noise of wireless links 70 . The second purpose builds on the first and targets to understand the RF environment for network optimization, e.g., to localize uncontrolled sources of interference in order to avoid or null them. Today’s RF sensing applications are quite impressive and include monitoring people in a room behind a wall 71 and monitoring individual heart rate 72 . Unfortunately, today’s RF methods have two fundamental limits. First, their inputs are the gains and phases of the channel matrix H and they subsequently rely on the dimensionality of H for resolution. Thus, to improve resolution further, array sizes would need to approach a massive MIMO scale, thus incurring the corresponding issues of size, cost, power consumption, and computational requirements. Second, because these methods were designed to operate below 6 GHz, their wavelength is centimeter to decimeter scale, limiting resolution correspondingly 73 .

As noted above, the use of THz frequencies opens up a number of new possibilities for joint sensing and communications, with important implications for the functioning of the control plane of the network, which is responsible for functions such as beam alignment and spectrum management. For example, as mentioned above, a directive transmitter and receiver must dynamically align their beams toward each other. In today’s standards for both 5G and Wi-Fi, a serial sector sweep is used for initial beam alignment, to sequentially test different directions. This trial-and-error method becomes increasingly cumbersome as beams become narrower. In contrast, the aforementioned leaky-wave device can be used to rapidly track mobile clients by using the received spectral signature 64 to estimate the receiver’s relative angle from the transmitter (see Fig.  6 ), a scheme which can be generalized to three-dimensional localization 74 . As another example, with arrays of sub-wavelength elements, one can envision a centimeter-scale surface with ~1000 independently controllable devices. This high oversampling yields new possibilities for dual-purposing communication and sensing: not only could one realize classical communication capabilities (e.g., beamforming and nulling of interferers or enhancing security), but one could also realize sensor functions (e.g., localization of users) with the same device 75 .

figure 6

An integrated circuit, fabricated in silicon CMOS, which realizes a leaky-wave antenna for single-shot localization of multiple users in a broadcast sector via broadband excitation of the angularly dispersive aperture. Figure adapted from H. Saeidi, S. Venkatesh, X. Lu and K. Sengupta, "THz Prism: One-Shot Simultaneous Localization of Multiple Wireless Nodes With Leaky-Wave THz Antennas and Transceivers in CMOS," in IEEE Journal of Solid-State Circuits, vol. 56, no. 12, pp. 3840-3854, Dec. 2021, https://doi.org/10.1109/JSSC.2021.3115407 . with permission of the authors under a Creative Commons license: https://creativecommons.org/licenses/by/4.0 .

Likewise, beam steering must also incorporate cases in which a direct line-of-sight path is not available. As discussed above, an IRS could be used to realize a reflected path thereby increasing coverage and avoiding blockage. However, building the device is not enough; in order to function properly, the network’s control plane must discover and configure this path, including properties of the IRS itself: for example, if the IRS provides a non-specular reflection, it must know the targeted incoming and outgoing angles. Since a network may alternate serving users in time, the IRS would need to reconfigure not only due to user mobility, but also according to which users are transmitting and receiving. Beam steering devices must also consider the new wavefronts described in Section 3. For example, in typical demonstrations of beams such as OAM 39 , the transmitter, and receiver are manually aligned and are typically placed broadside. To employ such wavefronts in a mobile network will require adaptation not only for location, but also for the relative orientations of the transmitter and receiver when they are not ideally oriented.

As noted above, the aforementioned techniques based on the idea of an IRS have previously been considered for use at lower frequencies, but their implementation takes on new urgency at these higher frequencies. In addition, there are some approaches which have been more widely employed at lower frequencies, and which can also offer valuable capabilities in the THz range. One good illustration is the assessment of angle-of-arrival for a mobile user via cooperative estimation of spatial correlations among multiple antennas, for example in a massive MIMO architecture. This possibility has recently been considered by Peng et al. 76 in the context of a THz network. Such legacy control-plane methods can play an important role, but will in general need some rethinking in view of the highly directional nature of transmissions in these networks, as well as the possibility (discussed above) that the user could be in the near field of the array.

Today’s wireless networks provide multi-user capabilities, in which an access point or base station transmits to (or receives from) multiple users simultaneously in order to increase aggregate data rate and decrease latency. Realizing this capability with THz frequencies will require two new advances. First, waveforms and modulation formats must be designed to support simultaneous transmission, incorporating that users will not be co-located and will be using directional transmissions. In some downlink cases, spatial separation of receivers combined with narrow beams may provide a simple starting point. Yet, for the uplink, and even for the downlink when users are close together, interference and co-stream management must be carefully controlled. Second, even if a network has the physical capability to realize a multi-user transmission, control plane mechanisms are needed to coordinate the transmission. Namely, the control plane must identify and localize the users, determine the appropriate spectrum and modulations to use, trigger the transmission at the correct time, and so on. In some cases, these functions are sufficiently similar to those of existing networks that comparable methods can be used; in other cases, entirely new protocols will need to be developed. For example, while traditionally medium access control protocols are driven by the transmitter, an alternative procedure based on receiver-initiated link synchronization, in which a receiver periodically polls potential transmitters as its antenna sweeps / scans the space, can increase the reliability and throughput and reduce latency 77 .

The many challenges discussed in this article have inspired a great deal of research over the last few years (only a small fraction of which could be included here). One challenge, not discussed above, involves the potential interference of wireless signals at these frequencies with existing (for the most part, passive) users involved in earth sensing or radio astronomy. Numerous research communities employ highly sensitive receivers to harvest information about the status of our atmosphere and the molecular composition of astronomical objects. It is critical that any active communication services that exploit frequencies above 100 GHz must be designed to avoid interference with these important existing communities 78 . Of course, because of the higher atmospheric attenuation and the high gain of transmitting antennas, issues of sharing and interference may be quite different at these high frequencies. More research is required, for example, to establish the limits for interference, or to demonstrate antenna configurations whose side lobes are designed to avoid interference with overhead satellites.

Unsurprisingly, the daunting nature of the technical challenges has also inspired some skepticism from some researchers in the field. A few have noted that R&D expenditures in THz systems from many of the major telecommunications companies remain only a small fraction of their total R&D budget. Of course, this is not surprising, since the market for these systems also remains tiny. At this juncture, one should not expect massive private sector investment in a technology that is probably at least a decade away. Another oft-stated concern relates to the need for such systems. Twenty years ago, a common refrain was that nobody would ever require frequency bands above 10 GHz for consumer applications; ten years ago, it was 60 GHz; today, with the emergence of the first commercial backhaul devices operating in D band 79 , the threshold has now moved to 140 GHz. In fact, we choose to regard this moving target as an optimistic indicator of the rapid progress in the field. This progress is embodied in exciting recent publications, including breakthrough new link demonstrations 80 , 81 and rapid advances in solid-state device technology 82 , 83 , 84 , 85 .

Of course, there are valid reasons for concern; the challenges discussed in this article are indeed formidable. Nevertheless, we feel that the research results of the last few years have established that THz technologies are a promising foundation for future needs in wireless networks, which seem likely to exploit these frequencies for at least some of their key functions 86 . While many open questions remain, there is at this point a clear and compelling motivation to pursue the goal of THz wireless.

IEEE 802.11 Working Group. Enhancements for very high throughput for operation in license-exempt bands above 45 GHz. IEEE P802.11ay/D3.0 (2019).

Kürner, T., Mittleman, D. M. & Nagatsuma, T. THz Communications: Paving the Way towards Wireless Tbps (Springer, 2021).

Shafie, A. et al. Terahertz communications for 6G and beyond wireless networks: challenges, key advancements, and opportunities. IEEE Network (IEEE, 2022).

Hirata, A. et al. 120-GHz-band wireless link technologies for outdoor 10-Gbit/s data transmission. IEEE Trans. Microw. Theory Tech. 60 , 881–895 (2012).

Article   ADS   Google Scholar  

Petrov, V., Kürner, T. & Hosako, I. First standardization efforts for sub-terahertz band communications towards 6G. IEEE Commun. Mag. 58 , 28–33 (2020).

Article   Google Scholar  

Balanis, C. A. Antenna Theory: Analysis and Design 4th ed. (John Wiley & Sons, 2016).

Kleine-Ostmann, T. & Nagatsuma, T. A review on terahertz communications research. J. Infrared Millim. Terahertz Waves 32 , 143–171 (2011).

Fu, Z. & Chen, R. T. Five-bit substrate guided wave true-time delay module working up to 2.4 Thz with a packing density of 2.5 lines/cm2 for phased array antenna applications. Opt. Eng. 6 , 1838–1844 (1998).

International Telecommunication Union, Radiocommunication Sector (ITU-R), Recommendation P.676-11, Attenuation by atmospheric gases. https://www.itu.int/rec/R-REC-P.676-11-201609-I (2016).

O’Hara, J. F. & Grischkowsky, D. R. Comment on the veracity of the ITU-R recommendation for atmospheric attenuation at terahertz frequencies. IEEE Trans. Terahertz Sci. Technol. 8 , 372–375 (2018).

Yang, Y., Mandehgar, M. & Grischkowsky, D. THz-TDS characterization of the digital communication channels of the atmosphere and the enabled applications. J. Infrared Millim. Terahertz Waves 36 , 97–129 (2015).

Fang, Z., Hornbuckle, M. & Mittleman, D. M. Secure communication channels using atmosphere-limited line-of-sight terahertz links. IEEE Trans. Terahertz Sci. Technol. 12 , 363–369 (2022).

Kallfass, I. et al. 64 Gbit/s Transmission over 850 m Fixed Wireless Link at 240 GHz Carrier Frequency. J. Infrared Millim. Terahertz Waves 36 , 221–233 (2015).

Wu, Q. et al. A 21 km 5 Gbps real time wireless communication system at 0.14 THz. In 42nd International Conference on Infrared, Millimeter, and Terahertz Waves (IRMMW-THz) (IEEE, 2017).

Sen, P., Siles, J. V., Thawdar, N. & Jornet, J. M. Multi-kilometer multi-gigabit-per-second (sub) terahertz communications. Nat. Electron. https://doi.org/10.1038/s41928-022-00897-6 (2022).

Federici, J. F., Ma, J. & Moeller, L. Review of weather impact on outdoor terahertz wireless communication links. Nano Commun. Netw. 10 , 13–26 (2016).

Sen, P. et al. Terahertz communications can work in rain and snow: Impact of adverse weather conditions on channels at 140 GHz. In 6th ACM Workshop on Millimeter-Wave and Terahertz Networks and Sensing Systems 13–18 (ACM, 2022).

Su, K., Moeller, L., Barat, R. B. & Federici, J. F. Experimental comparison of performance degradation from terahertz and infrared wireless links in fog. J. Opt. Soc. Am. A 29 , 179–184 (2012).

Han, C. et al. Terahertz wireless channels: a holistic survey on measurement, modeling, and analysis. IEEE Commun. Surv. Tutor. 24 , 1670–1707 (2022).

De Beelde, B. et al. Material characterization and radio channel modeling at D-band frequencies. IEEE Access 9 , 153528–153539 (2021).

Priebe, S., Kannicht, M., Jacob, M. & Kürner, T. Ultra broadband indoor channel measurements and calibrated ray tracing propagation modeling at THz frequencies. J. Commun. Netw. 15 , 547–558 (2013).

Abbasi, N. A. et al. THz band channel measurements and statistical modeling for urban D2D environments. IEEE Trans. Wirel. Commun. https://doi.org/10.1109/TWC.2022.3184929 (2022).

Sheikh, F., El-Hadidy, M. & Kaiser, T. Terahertz band: Indoor ray-tracing channel model considering atmospheric attenuation. In IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting 1782-1783 (IEEE, 2015).

Ma, J., Shrestha, R., Moeller, L. & Mittleman, D. M. Channel performance of indoor and outdoor terahertz wireless links. APL Photon 3 , 051601 (2018).

Jansen, C. et al. Diffuse scattering from rough surfaces in THz communication channels. IEEE Trans. Terahertz Sci. Tech. 1 , 462–472 (2011).

Ma, J., Shrestha, R., Zhang, W., Moeller, L. & Mittleman, D. M. Terahertz wireless links using diffuse scattering from rough surfaces. IEEE Trans. Terahertz Sci. Tech. 9 , 463–470 (2019).

Article   ADS   CAS   Google Scholar  

Messenger, R., Strecker, K., Ekin, S. & O’Hara, J. F. Dispersion from diffuse reflectors and its effect on terahertz wireless communication performance. IEEE Trans. Terahertz Sci. Tech. 11 , 695–703 (2021).

Ma, J. et al. Security and eavesdropping in terahertz wireless links. Nature 563 , 89–93 (2018).

Article   ADS   CAS   PubMed   Google Scholar  

Mei, Y., Ma, Y., Ma, J., Moeller, L. & Federici, J. F. Eavesdropping risk evaluation on terahertz wireless channels in atmospheric turbulence. IEEE Access 9 , 101916–101923 (2021).

Herold, C., Doeker, T., Eckhardt, J. M. & Kürner, T. Investigation of eavesdropping opportunities in a meeting room scenario for THz communications. In 16th European Conference on Antennas and Propagation (EuCAP) (IEEE, 2022).

Ju, S. & Rappaport, T. S. Sub-terahertz spatial statistical MIMO channel model for urban microcells at 142 GHz. In IEEE Global Communications Conference ( GLOBECOM ) (IEEE, 2021).

Toskala, A., Holma, H. & Nakamura, T. 5G Technology: 3GPP New Radio (John Wiley & Sons, 2020).

Wu, Q., Zhang, S., Zheng, B., You, C. & Zhang, R. Intelligent reflecting surface-aided wireless communications: a tutorial. IEEE Trans. Commun. 69 , 3313–3351 (2021).

Rouhi, K., Hosseininejad, S. E., Abadal, S., Khalily, M. & Tafazolli, R. Multi-channel near-field terahertz communications using reprogrammable graphene-based digital metasurface. J. Lightwave Technol. 39 , 6893–6907 (2021).

Zhang, H. et al. Beam focusing for near-field multiuser MIMO communications. IEEE Trans. Wirel. Commun. 21 , 7476–7490 (2022).

Jo, O., Kim, J.-J., Yoon, J., Choi, D. & Hong, W. Exploitation of dual-polarization diversity for 5G millimeter-wave MIMO beamforming systems. IEEE Trans. Antennas Propag. 65 , 6646–6655 (2017).

Durnin, J., Miceli, J. J. & Eberly, J. H. Comparison of Bessel and Gaussian beams. Opt. Lett. 13 , 79–80 (1988).

Efremidis, N. K., Chen, Z., Segev, M. & Christodoulides, D. N. Airy beams and accelerating waves: an overview of recent advances. Optica 6 , 686–701 (2019).

Zhou, H. et al. Utilizing multiplexing of structured THz beams carrying orbital-angular-momentum for high-capacity communications. Opt. Express 30 , 25418–25432 (2022).

Edfors, O. & Johansson, A. J. Is orbital angular momentum (OAM) based radio communication an unexploited area? IEEE Trans. Antennas Propag. 60 , 1126–1131 (2012).

Article   ADS   MathSciNet   MATH   Google Scholar  

Li, J.-S. & Chen, J.-Z. Multi-beam and multi-mode orbital angular momentum by utilizing a single metasurface. Opt. Express 29 , 27332–27339 (2021).

Article   ADS   PubMed   Google Scholar  

Khan, M. I. W. et al. A 0.31-THz orbital-angular-momentum (OAM) wave transceiver in CMOS with bits-to-OAM mode mapping. IEEE J. Solid State Circuits 57 , 1344–1357 (2021).

Venkatesh, S., Lu, X., Saeidi, H. & Sengupta, K. A high-speed programmable and scalable terahertz holographic metasurface based on tiled CMOS chips. Nat. Electron 3 , 785–793 (2020).

Article   CAS   Google Scholar  

Monroe, N. M. et al. Electronic THz pencil beam forming and 2D steering for high angular-resolution operation: a 98×98 unit, 265 GHz CMOS reflectarray with in-unit digital beam shaping and squint correction. In IEEE International Solid-State Circuits Conference ( ISSCC ) (2022).

Shrestha, R., Guerboukha, H., Fang, Z., Knightly, E. & Mittleman, D. M. Jamming a terahertz wireless link. Nat. Commun. 13 , 3045 (2022).

Article   ADS   CAS   PubMed   PubMed Central   Google Scholar  

Woo, J. et al. Physical-layer security for THz communications via orbital angular momentum waves. In IEEE Workshop on Signal Processing Systems ( SiPS ) (IEEE, 2022).

Hadani, R. et al. Orthogonal time frequency space (OTFS) modulation for millimeter-wave communications systems. In International Microwave Symposium ( IMS ) 681–683 (IEEE, 2017).

Grischkowsky, D., Keiding, S., Exter, M. V. & Fattinger, C. Far-infrared time-domain spectroscopy with terahertz beams of dielectrics and semiconductors. J. Opt. Soc. Am. B 7 , 2006–2015 (1990).

Chen, P., Wang, Y. & Babakhani, A. A 4 ps amplitude reconfigurable impulse radiator with THz-TDS characterization method in 0.13 μm SiGe BiCMOS. In IEEE MTT-S International Microwave Symposium ( IMS ) (IEEE, 2016).

Jornet, J. M. & Akyildiz, I. F. Femtosecond-long pulse-based modulation for terahertz band communication in nanonetworks. IEEE Trans. Commun. 62 , 1742–1754 (2014).

Bodet, D., Sen, P., Hossain, Z., Thawdar, N. & Jornet, J. M. Hierarchical bandwidth modulations for ultra-broadband communications in the terahertz band. IEEE Trans. Wireless Commun . (2022).

Bosso, C. et al. Ultrabroadband spread spectrum techniques for secure dynamic spectrum sharing above 100 GHz between active and passive users. In International Symposium on Dynamic Spectrum Access Networks ( DySPAN ) 45–52 (IEEE, 2021).

Abu-Surra, S. et al. End-to-end 6 G terahertz wireless platform with adaptive transmit and receive beamforming. in IEEE International Conference on Communications Workshops ( ICC Workshops ) 897–903 (IEEE, 2022).

Watts, C. M. et al. Terahertz compressive imaging with metamaterial spatial light modulators. Nat. Photon 8 , 605–609 (2014).

Sun, C., Chang, Q., Zhao, R., Wang, Y. & Wang, J. Terahertz imaging based on sparse MIMO array. In International Conference on Microwave and Millimeter Wave Technology ( ICMMT ) (IEEE, 2020).

Singh, A., Andrello, M., Einarsson, E., Thawdar, N. & Jornet, J. M. Design and operation of a smart graphene–metal hybrid reflectarray at THz frequencies. In 14th European Conference on Antennas and Propagation ( EuCAP ) (IEEE, 2020).

Bandurin, D. A. et al. Resonant terahertz detection using graphene plasmons. Nat. Commun. 9 , 5392 (2018).

Tu, N. H. et al. Active spatial control of terahertz plasmons in graphene. Commun. Mater. 1 , 7 (2020).

Jornet, J. M. & Akyildiz, I. F. Graphene-based plasmonic nano-antenna for terahertz band communication in nanonetworks. IEEE J. Sel. Areas Commun. 31 , 685–694 (2013).

Yeang, C.-P., Wornell, G. W. & Zheng, L. Oversampling transmit and receive antenna arrays. In International Conference on Acoustics, Speech and Signal Processing 2522–2525 (IEEE, 2010).

Jackson, D. R., Caloz, C. & Itoh, T. Leaky wave antennas. Proc. IEEE 100 , 2194–2206 (2012).

Ma, J., Karl, N. J., Bretin, S., Ducournau, G. & Mittleman, D. M. Frequency-division multiplexer and demultiplexer for terahertz wireless links. Nat. Commun. 8 , 729 (2017).

Article   ADS   PubMed   PubMed Central   Google Scholar  

Matsumoto, H., Watanabe, I., Kasamatsu, A. & Monnai, Y. Integrated terahertz radar based on leaky-wave coherence tomography. Nat. Electron 3 , 122–129 (2020).

Ghasempour, Y., Shrestha, R., Charous, A., Knightly, E. & Mittleman, D. M. Single-shot link discovery for terahertz wireless networks. Nat. Commun. 11 , 2017 (2020).

Li, R., Yan, H. & Cabric, D. Rainbow-link: beam-alignment-free and grant-free mmW multiple access using true-time-delay array. IEEE J. Sel. Areas Commun. 40 , 1692–1705 (2022).

Nguyen, H. V., Abielmona, S., Rennings, A. & Caloz, C. Pencil-beam full-space scanning 2D CRLH leaky-wave antenna array. In International Symposium on Signals, Systems and Electronics 139–142 (IEEE, 2007).

Kamoda, H., Iwasaki, T., Tsumochi, J., Kuki, T. & Hashimoto, O. 60-GHz electronically reconfigurable large reflectarray using single-bit phase shifters. IEEE Trans. Antennas Propag. 59 , 2524–2531 (2011).

Zhao, Y. et al. High-speed efficient terahertz modulation based on tunable collective-individual state conversion within an active 3 nm two-dimensional electron gas metasurface. Nano Lett. 19 , 7588–7597 (2019).

Shaikhanov, Z., Hassan, F., Guerboukha, H., Mittleman, D. & Knightly, E. Metasurface-in-the-middle attack: from theory to experiment. In 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ( WiSec ‘22 ) 257–267 (ACM, 2022).

Kanhere, O. & Rappaport, T. S. Outdoor sub-THz position location and tracking using field measurements at 142 GHz. In IEEE International Conference on Communications ( ICC ) (IEEE, 2021).

Zhao, M. et al. Through-wall human mesh recovery using radio signals. In IEEE/CVF International Conference on Computer Vision ( ICCV ) 10112–10121 (IEEE, 2019).

Lin, F. et al. Cardiac Scan: A non-contact and continuous heart-based user authentication system. In 23rd Annual International Conference on Mobile Computing and Networking ( MobiCom ‘17 ) 315–328 (ACM, 2017).

Kanhere, O. & Rappaport, T. S. Position location for futuristic cellular communications: 5G and beyond. IEEE Commun. Mag. 59 , 70–75 (2021).

Saeidi, H., Venkatesh, S., Lu, X. & Sengupta, K. THz prism: one shot simultaneous localization of multiple wireless nodes with leaky-wave THz antennas and transceivers in CMOS. IEEE J. Solid-State Circuits 56 , 3840–3854 (2021).

Domae, B. W., Boljanovic, V., Li, R. & Cabric, D. Machine learning prediction for phase-less millimeter-wave beam tracking. In IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication ( SPAWC ) (IEEE, 2022). https://doi.org/10.1109/SPAWC51304.2022.9833935

Peng, B., Guan, K. & Kürner, T. Cooperative dynamic angle of arrival estimation considering space–time correlations for terahertz communications. IEEE Trans. Wirel. Commun. 17 , 6029–6041 (2018).

Xia, Q., Hossain, Z., Medley, M. & Jornet, J. M. Link-layer synchronization and medium access control protocol for terahertz-band communication networks. IEEE Trans. Mob. Comput. 20 , 2–18 (2021).

Xing, Y. & Rappaport, T. S. Terahertz wireless communications: co-sharing for terrestrial and satellite systems above 100 GHz. IEEE Commun. Lett. 25 , 3156–3160 (2021).

Singh, A. et al. A D-band radio-on-glass module for spectrally-efficient and low-cost wireless backhaul. In IEEE Radio Frequency Integrated Circuits Symposium ( RFIC ) 99–102 (IEEE, 2020).

Kürner, T. & Kawanishi, T. Demonstrating 300 GHz wireless backhaul links – The ThoR approach. In 47th International Conference on Infrared, Millimeter and Terahertz Waves ( IRMMW-THz ) (IEEE, 2022).

Maes, D. et al. UTC photodiodes on silicon nitride enabling 100 Gbit/s Terahertz links at 300 GHz. In European Conference on Optical Communication ( ECOC ) (IEEE, 2022).

Rodwell, M. et al. Transistors for 100-300 GHz wireless. In IEEE 51st European Solid-State Device Research Conference ( ESSDERC ) (IEEE, 2021).

Wang, C. & Rebeiz, G. A 2-channel 136-156 GHz dual down-conversion I/Q receiver with 30 dB gain and 9.5 dB NF using CMOS 22 nm FDSOI. In IEEE Radio Frequency Integrated Circuits Symposium ( RFIC ) (IEEE, 2021).

Chen, Z., Choi, W. & O, K. K. 300-GHz double-balanced up-converter using asymmetric MOS varactors in 65-nm CMOS. IEEE J. Solid-State Circuits 57 , 2336–2347 (2022).

Mehta, Y., Thomas, S. & Babakhani, A. A 140–220-GHz low-noise amplifier with 6-dB minimum noise figure and 80-GHz bandwidth in 130-nm SiGe BiCMOS. IEEE Microwave Wireless Comp. Lett . 33 , 200–203 (2022).

Pang, X. et al. Bridging the terahertz gap: photonics-assisted free-space communications from the submillimeter-wave to the mid-infrared. J. Lightwave Technol. 40 , 3149–3162 (2022).

Download references

Acknowledgements

The authors gratefully acknowledge the assistance of Kaushik Sengupta, Hichem Guerboukha, and Duschia Bodet in assembling figures for this manuscript. D.M.M. acknowledges funding support from the US National Science Foundation (grant numbers 1923733, 1954780, 2148132, and 2211616) and the Air Force Research Laboratory (award number FA8750-19-1-0500). E.W.K. acknowledges funding support from Cisco, Intel, the US National Science Foundation (grant numbers 1955075, 1923782, 1824529, and 2148132), and the Army Research Laboratory (grant W911NF-19-2-0269). J.M.J. acknowledges funding support from the US National Science Foundation (grant numbers 1955004, 2011411, and 2117814) and the Air Force Research Laboratory (award number FA8750-19-1-0200).

Author information

Authors and affiliations.

Department of Electrical and Computer Engineering, Institute for the Wireless Internet of Things, Northeastern University, 360 Huntington Avenue, Boston, MA, 02115, USA

Josep M. Jornet

Department of Electrical & Computer Engineering, Rice University, 6100 Main St., Houston, TX, 77005, USA

Edward W. Knightly

School of Engineering, Brown University, 184 Hope St., Providence, RI, 02912, USA

  • Daniel M. Mittleman

You can also search for this author in PubMed   Google Scholar

Contributions

D.M.M., J. M.J., and E.W.K. contributed equally to the writing of this manuscript.

Corresponding author

Correspondence to Daniel M. Mittleman .

Ethics declarations

Competing interests.

The authors declare no competing interests.

Peer review

Peer review information.

Nature Communications thanks Robert Elschner, Shuai Nie and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Jornet, J.M., Knightly, E.W. & Mittleman, D.M. Wireless communications sensing and security above 100 GHz. Nat Commun 14 , 841 (2023). https://doi.org/10.1038/s41467-023-36621-x

Download citation

Received : 29 September 2022

Accepted : 09 February 2023

Published : 15 February 2023

DOI : https://doi.org/10.1038/s41467-023-36621-x

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

This article is cited by

Ultra-compact quasi-true time delay for boosting wireless channel capacity.

  • Bala Govind
  • Thomas Tapen
  • Alyssa Apsel

Nature (2024)

Curving THz wireless data links around obstacles

  • Hichem Guerboukha

Communications Engineering (2024)

Impact of noise on data routing in flying Ad hoc networks

  • Mohamed Ben Bezziane
  • Bouziane Brik
  • Amina Ben Bezziane

Optical and Quantum Electronics (2024)

A compact SiGe D-band power amplifier for scalable photonic-enabled phased antenna arrays

  • Reinier Broucke
  • Nishant Singh

Scientific Reports (2023)

Propagation of THz radiation in air over a broad range of atmospheric temperature and humidity conditions

  • Fatima Taleb
  • Mariana Alfaro-Gomez
  • Enrique Castro-Camus

By submitting a comment you agree to abide by our Terms and Community Guidelines . If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

research issues in wireless communication

Recent Challenges & Avenues in Wireless Communication through Advance computational Intelligence or Deep learning methods

As wireless communication becomes ubiquitous, a excess of devices ranging from smartphones to medical implants is increasingly competing for use of unlicensed spectrum.  As per today's network, these radio devices may interfere with each other by limiting its real-world throughput and capacity. To overcome the hurdles and challenge, these devices must calculate the nature of the environment; define interference limits, and to predict future time samples to cancel unwanted components of a corrupted received signal. If not accounted for, interference can lead to corruption of data that leads to unnecessary retransmission of corrupted packets. Since these results in a degradation of network performance, solving the problem of wireless interference prediction will yield networks with robust performance even while multiple devices contend for limited, shared spectrum. Solving the wireless interference problem is challenging because a wireless signal can be corrupted by a variety of other ambient wireless signals, such as Bluetooth, Wi-Fi, or Long Term Evolution protocol transmissions. The environment, such as walls and obstacles, can further attenuate these signals. The net randomness can make determining wireless interference a challenging endeavor. At the same time, wireless signals may exhibit specific periodic structure and cyclo-stationary features. Modern wireless architectures have not fully realized the potential of utilizing this data to segment and predict wireless interference.

Edited by: Nagaraj Balakrishnan, Danilo Pelusi, Chin-Teng Lin and Subramaniam Ganesan

Precise time and frequency transfer combined BeiDou’s RDSS and RNSS signals

Unlike other satellite navigation systems such as GPS (Global Positioning System), the BeiDou satellite navigation system broadcasts RDSS (Radio Determination Satellite Service) and RNSS (Radio Navigation Sate...

  • View Full Text

Multi-objective model selection algorithm for online sequential ultimate learning machine

In order to improve the channel equalization, improve the control quality, and reduce the error of the target output of the online sequential learning machine, a multi-objective model selection algorithm is pr...

Research on neural network chaotic encryption algorithm in wireless network security communication

The rapid development of wireless network brings a lot of convenience to people’s lives, but there are still many problems to be solved in wireless networks. Among them, communication security is the most crit...

Adaptive cascade single-shot detector on wireless sensor networks

The target detection model based on convolutional neural networks has recently achieved a series of exciting results in the target detection tasks of the PASCAL VOC and MS COCO data sets. However, limited by t...

Research on real-time network data mining technology for big data

The data distribution in big data environment is very different, and it is difficult to mine the data because of the strong interference of redundant data and frequent items. The traditional data mining algori...

A WSN positioning algorithm based on 3D discrete chaotic mapping

Wireless sensor networks are featured by restricted network resources, which is quite possible to result in low positioning precision and serious time delay in positioning, accordingly, the overall network pos...

Research on financial network big data processing technology based on fireworks algorithm

Big data is a hot issue in both theoretical and practical circles. Although many scholars have analyzed the risk of internal control of venture capital information system from different angles, there is still ...

Multi-sensing based target tracking by using decision-making strategy with spatial and temporal properties

Multi-sensing system for target tracking has been addressed by many researchers from different fields. In this work, a multi-sensing system within the time, space, and frequency domains is first described. The...

Research on time difference detection algorithm based on combination of GNSS and PPP

With the gradual increase in the number of GNSS systems and the improvement of functions, in addition to the single-system navigation and timing service, the integrated navigation and positioning service among...

A cost-effective decentralized vehicle remote positioning and tracking system using BeiDou Navigation Satellite System and Mobile Network

Most existing production vehicle tracking services rely on the Global Positioning System (GPS) and a proprietary server/client infrastructure. This type of inflexible and centralized architecture incurs severe...

A new intrusion detection and alarm correlation technology based on neural network

With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the netwo...

Design and implementation of AD9361-based software radio receiver

Existing software radio platforms constructed by discrete devices have many disadvantages, such as high power consumption, high cost, and poor portability. In this study, an AD9361-based software radio communi...

A new secure transmission scheme between senders and receivers using HVCHC without any loss

This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as ...

RETRACTED ARTICLE: The sustainable development information management of Winter Olympics based on Internet-based wireless sensor network

Environment is the foundation for human survival. Sustainable development is the main direction of social progress and the common choice of human progress. The development of the Winter Olympic Games is closel...

Quad-mode dual-band bandpass filter based on a stub-loaded circular resonator

In this paper, a quad-mode dual-band bandpass filter (BPF) only using a stub-loaded circular resonator is presented. The odd- and even-mode resonant frequencies can be easily computed and flexibly controlled b...

Path planning of mobile robot based on multi-sensor information fusion

Mobile robot is a very important branch of robotics. In practice, the performance of mobile robot is required to be higher and higher. It is required that mobile robot can adapt to different complex environmen...

RETRACTED ARTICLE: An empirical study on the relationship between China’s financial development and economic growth based on sensor technology

Since the reform and opening up, China’s economic growth and financial development have made remarkable achievements. Based on the macroeconomic data from 1992 to 2012, this paper studies the relationship betw...

RETRACTED ARTICLE: The effect of foreign direct investment based on wireless network technology on China’s regional economic growth

Foreign direct investment could not only provide funds to host countries, but also promote their economic growth. In view of this, research on the effect of foreign direct investment on the regional economic g...

RETRACTED ARTICLE: P2P net loan default risk based on Spark and complex network analysis based on wireless network element data environment

P2P net loan is the latest financial lending platform business, which is a new way of borrowing under the background of rapid development of the mobile Internet. Since the beginning of the new century, net loa...

RETRACTED ARTICLE: Research on the perfection of the countermeasures of the judicial execution scheme in the administrative law system based on annealing algorithm

With the continuous development of computer technology and the popularization and application of various types of intelligent algorithms, there are also applications in the current administrative judicial syst...

RETRACTED ARTICLE: The impact mechanism of rural land circulation on promoting rural revitalization based on wireless network development

The objective and accurate evaluation of land value is one of the biggest interest issues that farmers are concerned about in the transfer of rural land, and it is one of the influencing factors that influence...

Investigation and analysis of the effectiveness and influencing factors of internal control in Chinese enterprise based on wireless network

The internal control system of the enterprise is an important application method to improve the operational efficiency of enterprises and reduce unnecessary cost expenditures, and there are many factors that a...

Design of Micro-strip Symmetrical Dual-band Filter Based on Wireless Sensor Network Nodes

The micro-strip antenna filter design of wireless sensor network nodes is usually used to improve the out-of-band suppression and frequency selectivity by increasing the order of the filters, but the filters a...

RETRACTED ARTICLE: Data cleansing method of talent management data in wireless sensor network based on data mining technology

Data mining technology is a very common computer technology, which has been widely used in many fields because of its superior performance. The method of talent management data cleaning in wireless sensor netw...

Research on information retrieval model based on ontology

An information retrieval system not only occupies an important position in the network information platform, but also plays an important role in information acquisition, query processing, and wireless sensor n...

The mechanism of dividend distribution and management equity ratio interaction based on wireless network mode

In the stock market of China, the rights and interests of small- and medium-sized investors are frequently encroached upon. This criticism makes it an urgent task to effectively restrain the large shareholders...

The research of the application of the binary search algorithm of RFID system in the supermarket shopping information identification

The traditional bar code scanning in supermarkets is inefficient, which has been unable to meet the further development of a supermarket. To meet the needs of quick shopping in supermarkets, binary search algo...

Research on trust mechanism of cooperation innovation with big data processing based on blockchain

In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Bl...

Investigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology

With the continuous development of science and technology, wireless network technology has played an important role in the construction of intelligent logistics system. Under this background, based on the wire...

RETRACTED ARTICLE: Investigation of the evaluation system of SMEs’ industrial cluster management performance based on wireless network development

Today, with the rapid development of mobile Internet technology, the operation of enterprises is basically based on the mobile network platform. Therefore, the study of the evaluation system of SMEs’ industria...

RETRACTED ARTICLE: Research on the construction of regional electronic commerce large data analysis platform

The construction of regional electronic commerce large data analysis platform is studied. First, the collaborative filtering algorithm is focused on the further elaboration. According to the demand of the reco...

A performance optimization strategy based on degree of parallelism and allocation fitness

With the emergence of big data era, most of the current performance optimization strategies are mainly used in a distributed computing framework with disks as the underlying storage. They may solve the problem...

Emotion recognition and school violence detection from children speech

School violence is a serious problem all over the world, and violence detection is significant to protect juveniles. School violence can be detected from the biological signals of victims, and emotion recognit...

Accelerating the image processing by the optimization strategy for deep learning algorithm DBN

In recent years, image processing especially for remote sensing technology has developed rapidly. In the field of remote sensing, the efficiency of processing remote sensing images has been a research hotspot ...

A new energy-aware wireless sensor network evolution model based on complex network

For solving the problem of heterogeneous node energy and low energy efficiency in wireless sensor networks (WSNs), an effective and dynamic self-organization evolution model by introducing a complex network mo...

Development of automatic conveying system for vegetable seedlings

In order to improve the automation and reliability of the mechanized transplanting, a vegetable seedling automatic conveying system was designed. The functional execution component of the system consists of a ...

Positioning and guiding educational robots by using fingerprints of WiFi and RFID array

Positioning educational robots in the indoor ambiance is an important and basic function for robots to provide intelligent educational services for users, and it is still an open challenge problem. This paper ...

Analysis of the influences of bracket and force system in different directions on the moment to force ratio by finite element method

The human teeth face a variety of ways to move during orthodontic treatment. The types of orthodontic tooth movements have linked to the moment to force (M/F) ratio. This paper aims to determine the precise M/...

Integrated optimization of urban agglomeration passenger transport hub location and network design

Because of the influence of comprehensive hub construction on network flow, this paper adopts the bi-level programming model (BPM) to solve the problem about the integrated optimization of multi-hub location a...

An improved wolf colony search algorithm based on mutual communication by a sensor perception of wireless networking

Intelligence optimization algorithms have an important application in engineering calculation. Swarm intelligence optimization algorithms belong to the class of intelligent algorithms, which are derived from t...

Multi-objective virtual network embedding algorithm based on Q-learning and curiosity-driven

Network virtualization is a vital technology that helps overcome shortcomings such as network ossification of the current Internet architecture. However, virtual network embedding (VNE) involving the allocatio...

Intelligent optimization for support pressure zone algorithm based on fuzzy neural network damage identification

To predict the scope of support pressure zone in coal mining, this paper focuses on analysis over the features of stress transformation in front of the working face. Based on the fuzzy neural network (FNN) dam...

Real-time positioning of a specific object in the big data environment

Real-time positioning of a specific object in the big data environment can improve the monitoring and management capacity for network data. For the real-time positioning of the specific object, it is necessary...

Evaluation of network service model based on network convergence

Technologies such as Bluetooth, RFID, WiFi, 4G, and the Internet of things are mutually converged with ADSL and fiber to the home network. Users can get information in the forms of word, voice, images, etc. th...

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Sensors (Basel)

Logo of sensors

Future Wireless Communication Technology towards 6G IoT: An Application-Based Analysis of IoT in Real-Time Location Monitoring of Employees Inside Underground Mines by Using BLE

Sushant kumar pattnaik.

1 School of Electronics Engineering, KIIT University, Bhubaneswar 751024, India; [email protected] (S.K.P.); ni.ca.tiik@tefsadkj (J.K.D.)

Soumya Ranjan Samal

2 Faculty of Telecommunications, Technical University of Sofia, 1756 Sofia, Bulgaria; gb.aifos-ut@pkv

3 Department of Electronics & Communication Engineering, Silicon Institute of Technology, Bhubaneswar 751024, India

Shuvabrata Bandopadhaya

4 School of Physical Sciences, Banasthali Vidyapith University, Rajasthan 304022, India; [email protected]

Kaliprasanna Swain

5 Department of Electronics & Communication Engineering, Gandhi Institute for Technological Advancements, Bhubaneswar 752054, India; [email protected]

Subhashree Choudhury

6 Department of Electrical and Electronics Engineering, Siksha ‘O’ Anusandhan, Bhubaneswar 751030, India; moc.liamg@3eerhsahbus

Jitendra Kumar Das

Albena mihovska.

7 Department of Business Development & Technologies, Aarhus University, 8000 Aarhus, Denmark; kd.ua.hcetb@aksvohima

Vladimir Poulkov

Associated data.

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

In recent years, the IoT has emerged as the most promising technology in the key evolution of industry 4.0/industry 5.0, smart home automation (SHA), smart cities, energy savings and many other areas of wireless communication. There is a massively growing number of static and mobile IoT devices with a diversified range of speed and bandwidth, along with a growing demand for high data rates, which makes the network denser and more complicated. In this context, the next-generation communication technology, i.e., sixth generation (6G), is trying to build up the base to meet the imperative need of future network deployment. This article adopts the vision for 6G IoT systems and proposes an IoT-based real-time location monitoring system using Bluetooth Low Energy (BLE) for underground communication applications. An application-based analysis of industrial positioning systems is also presented.

1. Introduction

In recent years, wireless technology has been one of the fastest-growing technologies in the area of communication. Today, wireless technology is becoming one of the largest carriers of digital data around the globe. According to the Cisco Visual Networking Index (VNI) Global Mobile Data Traffic for 2016 to 2022, worldwide mobile data traffic increased about 10-fold over these 6 years, reaching 77 exabytes (approx.) per month by 2022 ( Figure 1 a [ 1 ]). According to [ 1 ], the device mix is becoming smarter (advanced computing and multimedia competencies with at least 3G connectivity) with an increasing number of smart devices with high computing capabilities and better network connectivity, which creates a growing demand for smarter and more intelligent networks. The share of smart devices and connections as a percentage of the total will increase from 46 percent in 2016 to 85 percent by 2022, a more than two-fold increase during the figure time frame Figure 1 b [ 1 ]. It is expected that 75 billion devices will be connected by the end of 2025 [ 2 ]. Service providers around the globe are busy rolling out 5G networks to meet the growing demand of the end consumer for greater bandwidth, higher safety and quicker connectivity on the move. Many vendors have additionally begun area trials for 6G and are getting closer to rolling out 5G deployments in the direction of the end of the forecast length.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g001.jpg

Cisco Annual Report from 2016 to 2022 [ 2 ]: ( a ) Cisco Visual Networking Index Global Mobile Data Traffic from 2016 to 2022; ( b ) Global Growth of Smart Mobile Devices and Connections Excluding Low-Power Wide-Area (LPWA).

Moreover, the heterogeneous nature of the next-generation communication networks in terms of the application, communication technology used and involvement of diversified devices brings a large variety of requirements and expectations. Today’s world is focusing more on the IoT due to its wide range of applications from human-centric to industry 4.0/industry 5.0. Nevertheless, device-to-device (D2D), machine-to-machine (M2M) and vehicle-to-vehicle (V2V)/V2X communication technologies constitute the real applications showing the widespread advantages of the IoT [ 3 , 4 , 5 , 6 , 7 , 8 , 9 ]. Furthermore, reliable data transmission with low latency is another key challenge for successful IoT applications [ 10 ]. The emergence of the Internet of Everything (IoE), which offers remarkable solutions for massive data transmission to the edge network, and the integration of Industrial Control Systems (ICSs) with the IoE recast it as the Industrial Internet of Everything (IIoE) [ 5 ]. Again, with the evolution of different emerging technologies such as artificial intelligence (AI), machine learning (ML), cloud computing, cognitive computing, edge computing, fog computing, blockchain technology, etc., various challenges are being addressed in different IoT industrial applications. Such complex IoT networks provide substantial technological prospects that facilitate the realization of good quality of service (QoS) and quality of experience (QoE). For example, the Internet of SpaceThings (IoST) for high speed, reduced latency and umbrella Internet coverage; the Social Internet of Things (SIoT) for an interface between human and social networks; the Internet of NanoThings (IoNT) for telemedicine; and the Internet of UnderwaterThings (IoUT) for improving ocean water quality, cyclonic/tsunami disaster management, etc. [ 11 ].

In view of this, the IoE introduces essential protection challenges due to the wide variety of functionality and demanding situations. There is always a dependency of the IoT on cellular networks since long-term evolution (LTE) was introduced, which is enhanced as 5G/6G in some specific scenarios. The demand for high throughput, high energy efficiency and better connectivity with reduced latency time can be attained beyond 5G/6G networks [ 12 ]. The 6G system will offer a better enrollment of the IoT devices as the 5G IoT has provided a solid foundation. The future 6G network is envisioned to be service-oriented, where software-defined networks (SDN) and network function virtualization (NFV) will play a vital role in the end-to-end architecture [ 13 ]. These technologies are capable of providing better coverage with high throughput, improved spectrum efficiency, greater bandwidth and ultra-low latency. The 6G IoT system is sustainable for high-accuracy localization and sensing, which are necessary for most of the envisioned highly computationally intensive applications.

Related Work and Key Contributions

A growing number of research works focus on current advances in wireless and IoT technology, including in-depth analysis of the advanced technology concepts, methodology and techniques.

Specifically, [ 14 ] provides a comprehensive survey on key enabling technology for 6G, where the emphasis is on a discussion of the operation of the individual technology with useful statistics for industries and academic researchers on the potential for investigating new research directions. The authors of [ 15 ] discussed the requirements of 6G and recent research trends to enable 6G capabilities and design dimensions by employing disruptive technologies such as artificial intelligence (AI) and driving the emergence of new use cases and applications manifested by stringent performance requirements. A review of 6G in terms of use cases, technical requirements, usage and key performance indicators (KPI) is presented in [ 16 ]. Here, the authors presented a preliminary definition roadmap, specifications, standardization and regulation for 6G. A survey on wireless evolution toward 6G networks is presented in [ 17 ], discussing the capabilities of network slicing technology with AI to enable a multitude of services with different quality of service (QoS) requirements for 6G networks. A comprehensive survey on the existing trends, applications, network structure and technologies of 6G is presented in [ 18 ], with a focus on industrial markets and use cases of 6G that take advantage of a better on-device processing and sensing, high data rates, ultra-low latencies and advanced AI. In [ 19 ], the authors presented an overview of 6G describing the complete evolution path from 1G networks to date and focusing on several key technologies such as terahertz communications, optical wireless communications (OWC) and quantum communications for improving the data rates.

A comprehensive survey on the convergence of the IoT and 6G is presented in [ 20 , 21 ] with a focus on edge intelligence, reconfigurable intelligent surfaces, space–air–ground–underwater communications, terahertz communications, massive ultra-reliable and low-latency communications and blockchain as the technologies that empower future IoT networks. A comprehensive study on 6G-enabled massive IoT is presented in [ 22 ], where ML and blockchain technologies are discussed as the primary security and privacy enablers. In [ 23 ], the potential of the IoT and 6G for various use cases in healthcare, smart grid, transport and Industry 4.0 have been elaborated jointly with the challenges during their practical implementations. Several shortcomings of 5G and features of 6G related to social, economic, technological and operational aspects such as the weakness of short packet and sensing-based URLLC, which may limit the dependability of low-latency services with high data rates or the lack of support of advanced IoT technologies are discussed in [ 24 ]. Current research activities, therefore, should focus on innovative techniques such as advanced time-stamp stream filtering combined with intelligent network slicing to support multi-party (source) data stream synchronization in very low latency environments coupled with distributed control (at the edge).

In [ 25 ], the author mainly focuses on the integration of blockchain technology into 6G, the IoTand IIoT networks. Blockchain technology has a strong potential to fulfill the requirements for massive 6G-based IoT for the integrity of personal data protection, data privacy and security and scalability. Furthermore, a sustainable ecosystem-focused business model, driven by blockchain-empowered 6G networks is thoroughly analyzed to deal with the cutting-edge worldwide economic disaster. Envisioning the green 6G–IoT network, a novel joint design technique using intelligent reflective surface (IRS) and ambient backscatter communication (ABC) is proposed in [ 26 ]. This method is primarily based on the joint design of an iterative beamforming vector, an IRS phase shift and reflection coefficients to decrease the AP’s transmit power without affecting the QoS. The author in [ 27 ] addressed the three fundamental components, i.e., artificial intelligence (AI), mobile ultra-high speed and the (IoT) for the future 6G network. The authors focused on the recent approaches, research issues and key challenges of IoT network topology and terahertz (Tz) frequency. A comprehensive survey of existing 6G and IoT-related works is summarized in Table 1 .

A Comprehensive Survey of existing 6G and IoT related works.

The contributions to this paper can be outlined as follows:

  • We present the vision of the IoT with the technologies impacting it with their key features
  • We review several applications and challenges of the IoT in different domains.
  • We present different connectivity standards of the IoT and a rigorous review of these technological standards
  • We present a comparative analysis between 5G and 6G.
  • We present the vision and key features of 6G with its different aspects.
  • We present a brief review of several challenges of 6G.
  • We propose a BLE-based real-time location monitoring system by using the IoT

The remainder of this article is organized as follows. Section 2 presents the vision, applications and challenges of the IoT, including the connectivity standards and a comparative analysis of their capabilities. In Section 3 , a comparative analysis of 5G and 6G with the vision key features and the challenges of 6G is presented. Section 4 proposes and discusses a BLE-based real-time location monitoring system by using the IoT. Finally, we draw conclusions in Section 5 . Related abbreviations are listed in the Appendix. A schematic representation of the structure of the paper is shown in Figure 2 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g002.jpg

Structure of the Paper.

2. Visions, Applications and Challenges of the IoT

In the last few decades, the IoT has become the most promising and thriving area of research in academia and industry. The IoT extends the existence of communication by converging clients, businesses and industries by connecting intelligent things with each other through the cloud. These smart connections encompass different network applications, communication technologies and smart devices along with physical and virtual things. The IoT paradigm is a transformation from a centralized computer-based network to a completely distributed network of smart devices. To take the potential benefits of the IoT and to compete globally, the IoT European Research Cluster (IERC) has focused mainly on establishing a cooperation platform between companies and organizations for developing more research activities on the IoT at the European level. The primary objective of IERC is to facilitate making the research activities more ambitious and neoteric. The International Telecom Union (ITU) was the first international agency to produce a report on the IoT in 2005 [ 28 ]. Thereafter a new standard of the IoT was approved by the ITU in 2012 [ 29 ]. However, the term IoT was first used by the Massachusetts Institute of Technology’s (MIT’s) Kevin Ashton in 1999 [ 30 ].

2.1. Vison of the IoT

The vision of the IoT has different perspectives based on the data generated by the connected objects and the technology used. During the early stages of IoT implementation, the vision was to identify the physical objects by using radio frequency identification (RFID) tags. However, due to recent technological advances, the vision of the IoT has been reformed by encapsulating varying technologies and smart sensors. The IoT leads the way in unfolding the new generations of different compelling applications and services in the field of Industrial IoT (IIoT), Industry 4.0 and Society 5.0. Figure 3 , illustrates the key technologies that impact the IoT.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g003.jpg

Technologies impacting the IoT.

2.2. Applications of the IoT

IoT applications in various sectors have been assessed based on their impacts on society and the economy along with their technology readiness level (TRL). The applications of the IoT are diversified based on their use in different fields such as intelligent homes, healthcare, agriculture, transportation, the environment, education, retail and logistics, industries and many more [ 31 , 32 , 33 , 34 ]. Consequently, the IoT has also had an impact during the pandemic era of COVID-19 in many aspects, e.g., contact tracing, virus detection by temperature scanning, remote health monitoring, quarantine e-tracking, virus spread control, etc., and also in tackling the post-COVID-19 situation [ 35 , 36 , 37 , 38 ]. AI-integrated IoT technology for the early detection of COVID-19 is discussed in [ 37 ]. This research mainly focuses on analyzing the extracted features of cough, shortness of breath and speech difficulties by using long short-term memory (LSTM) with recurrent neural network (RNN). In [ 38 ], an IoT-based real-time learning system is developed to control the spread of COVID-19 infection in the context of smart healthcare for residents. The system is used to monitor and analyze user activities and environmental parameters which helps predict critical cases, so alerts can be sent to the caretakers. A few applications of the IoT are briefly presented in Table 2 .

Applications of the IoT.

2.3. The IoT Challenges

With an increase in the number of smart devices and real-time applications, the complexity of IoT networks has increased in terms of their densities and architecture. These complexities scale down the performance competencies of the current IoT network. There are several IoT challenges, namely, universal standardization, connectivity, cloud computing, energy efficiency, IoT protocol and architecture in addition to security and privacy. The IoT is still in its developing stage; so many more challenges have to be addressed with the revolution of technologies in the future research domains of the IoT. A few challenges of the IoT are briefly presented in Table 3 .

Challenges of the IoT.

2.4. IoT Connectivity Standards

As per the IoT analytics report, there are mainly 21 IoT connectivity standards that can be broadly classified in two ways: as cellular IoT and non-cellular IoT connectivity standards. The cellular IoT standards are operated at a licensed spectrum, whereas the non-cellular IoT is operated at a non-licensed spectrum. Different IoT connectivity standards are depicted in Figure 4 [ 135 ] [Source: IoT Analytics Report 2021]. A comparative analysis of different IoT connectivity standards is presented in Table 4 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g004.jpg

IoT Connectivity Standards.

Comparison of different IoT Connectivity Standards.

3. Vision, Key Features and Challenges of 6G

With the standardization of 5G about to complete and its commenced global deployment, several latent limitations to meet the necessary requirements of IoT systems still remain. These impediments mainly relate to the high computation, security, wireless brain-computer interface (WBCI) intelligent communication in terms of more autonomous human-to-machine (H2M) communication, holographic communication (augmented reality/virtual reality) and AI. These data-hungry applications require more spectrum bandwidth (e.g., mm-wave) and high spectral efficiency which can be realized at the sub-terahertz (sub-THz) and THz bands [ 154 ]. Furthermore, due to the incorporation of a wide variety of mobile applications, there are some more challenges (beyond uRLLC, coverage, localization, privacy, power consumption, better quality-of-service, etc.) that need to be addressed in the future B5G wireless communication standards. In this context, the 6G is attracting more researchers from academia and industries towards itself. A comparative analysis between 5G and 6G is presented in Table 5 .

A comparative analysis between 5G and 6G.

3.1. Vision and Key Features of 6G

Despite the dramatic revolution of IoT–5G application in today’s wireless networks, 6G is anticipated to excel 5G in many ways, not only in daily life, but also in Society 5.0. Even though 6G is not a talking point of global harmony so far, some additional features with more potential and capabilities are being discussed. In this section, a comprehensive vision of a 6G network is presented from multiple perspectives as shown in Figure 5 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g005.jpg

Vision and key features of 6G [ 22 , 26 , 154 , 156 , 165 , 166 , 167 , 168 , 169 , 170 , 171 , 172 , 173 , 174 , 175 , 176 , 177 , 178 , 179 , 180 , 181 , 182 , 183 , 184 , 185 , 186 ].

3.1.1. Intelligent Network

As 6G is envisioned as a fully automated and smart network, the incorporation of AI, MLand quantum machine learning (QML) makes the future wireless networks more intelligent and predictive by limiting human efforts [ 176 , 187 ]. AI and ML are the transforming technologies and data analytics tools in the modern era of wireless communication that bring new research challenges in the field of 6G IoT [ 186 ]. By using big data and ML, a more precise performance prediction model can be implemented in a 6G IoT network to make smart decisions for security, optimization, resource allocation, network management, self-organization, etc., [ 155 , 156 , 157 , 158 , 159 , 160 , 161 , 162 , 163 , 164 , 165 , 188 ]. Due to the high veracity/volume data and complex 6G IoT network structure, it is necessary to instigate more futuristic learning/training frameworks for high-dimension neural networks (HDNN) [ 165 ].

3.1.2. Decentralized Network

Due to the emergence of multi-access edge computing (MEC) in the 5G network, there are several limitations in the centralized network, e.g., privacy, security, trust, incompatibility of the existing protocol to the dynamic connectivity and distributed and ubiquitous computing [ 166 ]. Thus, it is necessary to prepare a blueprint of decentralized architecture to support such a dynamic and autonomous network. In this regard, blockchain is a promising technology for the future 6G network and is capable of dealing with these challenges. Blockchain technology can provide a decentralized network management framework that can be used for resource management, data sharing/storage, spectrum sharing and other challenges [ 172 , 173 , 174 , 175 , 189 ].

3.1.3. Green Network

The 6G network is expected to meet the essential requirements for energy-efficient wireless communication globally. The green 6G network enables minimum energy utilization and helps achieve a peak data rate (THz) during signal transmission. A significant improvement in the energy efficiency of a network can be greatly experienced by incorporating different energy-harvesting techniques [ 154 , 190 ]. This also helps facilitate green communication by reducing CO 2 emission. In addition, several communication techniques, e.g., D2D communication, massive multiuser multiple-input-multiple-output (MIMO), heterogeneous network (HetNet), green IoT, non-orthogonal multiple access, energy-harvesting communications, etc., may be adopted to facilitate green communication for future wireless networks [ 191 , 192 , 193 ].

3.1.4. Superfast Network

With reference to the data analysis shown in Figure 1 , the ever-increasing demand for high data rate and seamless connectivity to such ultra-dense networks can be provided by integrating terahertz (THz) (ranges from 0.1–10 THz) communication in 6G networks [ 168 , 177 , 178 ]. A vast amount of unused radio spectra which can be efficiently used to increase network capacity is available in the THz band. THz is additionally reasonable for high data rate transmission and short-range communication by empowering the ultra-high bandwidth and uLLC paradigms. An extensive review of THz communication with its future scope and challenges is presented in [ 194 ].

3.1.5. Human-Centric

It is believed that human-centric communication is a key feature of the 6G network. With the help of this technology, sharing and/or accessing different physical features can be possible by humans. To accelerate human-centric communication rather than technology/machine-centric communication, the principal means of human perception must be incorporated into the communication system module [ 195 ]. A human-centric communication framework needs two fundamental aspects—technology and user experience (UE). The latter includes human behavior as well as psychological and socioeconomic contexts and needs to be considered during the modeling and analysis of the communication system [ 183 , 184 , 195 ].

In 2016, Society 5.0 was initiated by the Japanese cabinet in its Fifth Science and Technology with a vision to build a “Super Smart Society” [ 196 ]. Later, the vision was revised and presented by the Keidanren Business Federation with the prime focus of delivering sustainable development goals (SDGs) through the creation of Society 5.0 [ 183 , 184 , 197 ]. Society 5.0 is designed to solve different social issues by taking advantage of technological advancements. Considering different aspects of economic growth, social and environmental conditions, 17 primary objectives and 167 goals are listed in the Agenda 2030 by the United Nations to address several global challenges [ 198 , 199 ].

3.2. Challenges of 6G

Even though several advanced features have been added to 6G networks to enhance the performance matrices in comparison with 5G networks, there are still some key challenges that must be addressed further. These challenges are broadly classified into two categories: (i) technological challenges that include high throughput, EE, connectivity flexibility, more intelligent optimization techniques, etc., and (ii) non-technological challenges including industry barriers, spectrum allocation, regulatory policies and standardization, etc. [ 200 ]. A few key challenges of the future 6G networks are summarized in Figure 6 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g006.jpg

Challenges of 6G [ 5 , 154 , 156 , 200 , 201 , 202 , 203 ].

In addition, due to the integration of the IoE, terrestrial and non-terrestrial communication networks in 6G, their different heterogeneous highlights must be considered to productively coordinate them. Heterogeneity is likewise present in the protocol that those communication networks will comply with. Thus, 6G is taking on the massive task of integrating a number of heterogeneous aspects [ 203 ]. Furthermore, due to the inclusion of mm-Wave and THz communication, 6G networks are facing several more open challenges, e.g., more sensitive low-power transmitter, new model architecture, advanced propagation techniques for better coverage and directional communication. The networks must also deal with system noise, channel fading and fluctuations [ 169 , 203 , 204 , 205 ]. Several more challenges such as computational and processing resources due to the application of AI [ 206 ], a few ML application-related challenges [ 207 ], training issues and interoperability challenges [ 208 ], challenges in estimating the channel information by using reconfigurable intelligent surfaces (RIS) [ 209 , 210 ] and computational and trade-off challenges due to the application of artificial neural networks (ANN) in the IoT [ 211 ] have been recognized for the future 6G networks.

4. An IoT-Based Real-Time Location Monitoring System by Using BLE

Mining is one of the most speculative businesses around the globe. Most of the mines all over the world are lagging in different safety measures causing many casualties and deaths. The basic causes of death in underground mines are gas accidents, rock falling, ventilator accidents, fire, explosions, etc. Considering the safety issues of the employees/workers inside the mines, real-time location tracing of those employees becomes a major concern. Effective underground communication is necessary to collect more information about the mines or workers. However, there are various constraints while collecting the real-time data inside the mines such as restricted transmitting power, large attenuation of the transmitted signal from the rock wall and low penetration of the electromagnetic signal. In this regard, it is always beneficial to take the potential advantages of low-power and short-range communication technologies such as, RFID, Zigbee, Bluetooth, Bluetooth low energy (BLE), etc.

In this section, a scenario for a Bluetooth low energy (BLE) beacon-based real-time location monitoring of employees/workers by using the IoT is presented. A BLE beacon and microcontroller are used to design this asset-tracking product and have been implemented in the IoT here by connecting this device to the cloud.

4.1. State-of-Art

Underground communication inside mines is a major factor for the safety and security concerns of the mineworkers. The advent of IoT technology and its usefulness can be beneficial for the mining industry. It is believed that a robust communication infrastructure using IoT technology inside the mines may enhance the safety of the workers and is also capable of providing real-time information resulting in quick action to avoid lethal situations. Several researchers have proposed various frameworks and ideas for efficient communication inside the mines based on IoT technology, which includes low-power and short-range communication.

The authors of [ 212 , 213 ] proposed a wireless sensor network (WSN)-based monitoring system for underground mines. In this proposed technique, various sensors are placed at different locations to collect activities and positions of the employees, and the collected data are transferred to the end user or the central server via BS. Nageswari et al. [ 214 ], proposed an IoT-based smart mine monitoring system that uses radio frequency (RF) technology for communication purposes inside the mines. With this proposed technique the real-time location and real-time sensing of the dynamically varying environment can be achieved by using RF technology and WSN network, respectively. The major drawback of this proposed model is that large-signal transmission loss occurs through the walls of underground mines. An IoT-based mine safety system using WSN was proposed in [ 215 , 216 ]. In these proposed techniques, the authors used a Zigbee module for information collection from the cloud and measured the surrounding parameters of underground mines with the help of various sensors. A mine safety system using WSN was proposed in [ 217 ], where the authors constructed a prototype by using Zigbee and WSN to monitor safety issues and to measure the ambient properties, e.g., temperature, humidity, airflow, etc., inside the underground mines. A Zigbee compliant RFID-based safety system for underground coal mines was proposed in [ 218 ], where a unified wireless mesh-network infrastructure was used to monitor and locate the workers and measure the different environmental parameters inside the coal mines. Similarly, an IoT-based system for underground coal mines that uses a microcontroller, a node MCU and various sensors to measure the environmental conditions and safety measures of workers was proposed in [ 219 ]. A LoRaWAN-based coal safety and health monitoring system was proposed in [ 220 ]. In this proposed methodology, LoRaWAN uses low-power RF with a wide communication range and IoT technology for monitoring the workers’ health and observing the status of the circumstances in the coal mines.

There are several existing technologies used for communication purposes in underground mines. The most common approaches are RFID, Zigbee, Bluetooth, GPS, etc. Table 6 presents a comparative analysis of some existing technologies in terms of their pros and cons [ 214 , 215 , 216 , 217 , 218 , 219 , 220 , 221 ].

A comparative analysis of some existing technologies.

4.2. Proposed System Architecture and Workflow

To overcome these issues, our proposed technique uses BLE, which is a low-power and low-cost technology. This proposed methodology reduces the deployment cost and complexities by using the BSs of the existing cellular network infrastructure for the communication process. The system architecture of BLE-based real-time location monitoring in mines by using the IoT is shown in Figure 7 . In this scenario, two base stations (BS) are deployed to provide necessary services (uplink/downlink) to the BLE devices through the central office server as shown in Figure 7 a, and the complete workflow is shown in Figure 7 b.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g007a.jpg

Proposed system architecture and workflow. ( a ) Proposed System Model; ( b ) Complete Workflow Process.

Figure 7 a shows the coverage area of BLE and cell towers based on their transmitted power. The blue and green colored portion shows the energy region of BLE devices and cell towers, respectively. As can be seen, cell tower 0 transmits more power compared to cell tower 1. All the BLE devices are wearable or are attached to the employee working inside the mines. In this proposed method, beacons are considered because they can be easily identified by single board computers (SBC) as shown in Figure 8 . Different beacons are accessed by the nearest SBC based on their coverage area. The blue-colored region indicates the transmitted energy by the beacon signal as shown in Figure 8 a. The system contains beacons that are small and inexpensive, which emit signals in the same fashion as BLE. The used beacons have a short-range and can triangulate position in the same way that a phone uses cell towers with an assisted global positioning system (AGPS). These transmitters are deployed at known points inside the mines, and they permit the device to obtain area fixes. This data can be utilized to make new client encounters, for example, turn-by-divert headings for indoor situating from gateways/applications that read the guide signals.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g008.jpg

Position of SBC and random distribution of BLE devices inside the mine area ( a , b ).

The scenario presented in Figure 8 a,b shows the position of the SBC (fixed position) and a random distribution of BLE devices, as the position of BLE device (wearable) depends on the position of the employee working inside the mine. The BLE receivers/gateway receives the universally unique identifier (UUID) transmitted by the beacons in a repetitive manner as shown in Figure 8 a,b. These signals can be utilized to differentiate between subgroups and individual ones in the subgroups. It is modified to check the accessible BLE signals “on the air” and the received signals contain the accompanying snippets of data in a bundle size of 60 bits, with 10 bits specifying major and minor values. The received signal strength indicator (RSSI) values can be utilized to decide the distance of the receiver to every one of the reference points. As those region statistics are stored inside the database, navigation of the receiver also can be tracked, and alerts can be generated if certain rules are violated. All the beacon data are stored in a local server through the gateway and then transferred to the central office server through cell towers as shown in Figure 8 a,b. The central office server is continuously updated based on the real-time information sent by the BLE beacon through the gateway. This information can be used to find the real-time location of the employees/workers inside the mines.

4.3. Simulation Result and Discussion

The simulation result in Figure 9 shows the discovery time of the BLE devices. It can be seen that the visibility time of the BLE device is constant, and the delay time is also very small. Hence, it helps to find the real-time location of the employees/workers inside the mines within a short time. Due to the small visibility time, the rescue process can be improved for the employees/workers (real-time locations) inside the underground mines during any hazardous situation.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-03438-g009.jpg

Discovery time of BLE device.

5. Conclusions

This paper summarizes and relates the future direction of IoT applications to current 6G trends, development sand challenges. The study looked at the vision and different technologies impacting the IoT as outcomes of international research. The paper considered the applications in various sectors and provided a summary of the different IoT technologies. The various IoT connectivity standards and a few challenges remaining open for IoT integration with cellular systems were outlined. The IoT is a basic building block for next-generation industrial standard 4.0/5.0 smart applications in home, city, agriculture, healthcare and many more uses, but this requires a major upgrade of the physical and network layers of upcoming cellular wireless networks. In this paper, a brief comparison between 5G and 6G was presented in terms of the technical features. The vision and key features of 6G along with the implementation challenges were discussed. This paper also includes a case study related to the real-time application of the IoT to locate the employees in underground mines using BLE technology. The system architecture and workflow for the given application were presented. This article might assist the researcher apprehend various challenges with their applications of the IoT and 6G to the real world.

Acknowledgments

The authors acknowledged support from the project HOLOTWIN (D01-285/06.10.2020) financed by the Ministry of Education and Science of Bulgaria.

Abbreviations

Funding statement.

The APC was funded by the Ministry of Education and Science of Bulgaria fund research project HOLOTWIN (D01-285/06.10.2020).

Author Contributions

S.K.P.: concept and setup preparation, design of system model; S.R.S.: concept, methodology creation, model selection, analysis and simulations supervision, text editing; S.B.: text and plot preparation, design of system model supervision, simulations and review; K.S. and S.C.: setup preparation, design of system model supervision, data preparation and text editing; J.K.D. and A.M.: methodology validation, model validation, setup preparation and data preparation, V.P.: overview of model validation, final model preparation, data preparation supervision, text editing and review. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Data availability statement, conflicts of interest.

The authors declare no conflict of interest.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research Directions

  • Published: 06 April 2024
  • Volume 134 , pages 1617–1639, ( 2024 )

Cite this article

research issues in wireless communication

  • Ajay K. Gupta   ORCID: orcid.org/0000-0001-9666-5047 1 &
  • Udai Shanker 1  

64 Accesses

Explore all metrics

Context-aware computing processes the mobile user’s query/transaction submitted from anywhere at any time. Basically, location based services (LBSs) are continuous, local, and spatially confined applications of computing in the context-aware mobile environment, where queries/transactions are initiated by the mobile users. The smartphones as a resultant of today’s advanced mobile technologies allow these mobile users to access numerous LBSs and provide information interactively to them depending on their locations. The mobile user’s positions and associated confidential information enable more sensitive information to be created; but, it inevitably leads to a threat that these sensitive information may be used for different purposes by the third parties. Also, there is lack of state of the art location privacy preservation procedures to be able to create a balance between user location/ activity privacy preservation and quality of services in LBSs technologies. Therefore, there is a need to do more research efforts to ensure the privacy of these mobile users by developing the secured location-based technologies. Thus, our this study specifically discusses the aforementioned issues, a literature for the taxonomy of the privacy preservation approaches available to the research community with comparative analysis over the common attributes, highlighting limitations/strength, recent advancement and provides possible research directions for the further investigation of the unanswered questions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research issues in wireless communication

Similar content being viewed by others

research issues in wireless communication

Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective

research issues in wireless communication

Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework

research issues in wireless communication

The Ethics of Privacy in Research and Design: Principles, Practices, and Potential

Data availability.

Not applicable.

Barbara, D. (1999). Mobile computing and databases-a survey. IEEE Transactions on Knowledge and Data Engineering, 11 (1), 108–117. https://doi.org/10.1109/69.755619

Article   Google Scholar  

Gambs, S., Killijian, M., Cortez, M. N. d. P. (2013). De-anonymization attack on geolocated data. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 789–797). https://doi.org/10.1109/TrustCom.2013.96 .

Liu, H., Darabi, H., Banerjee, P., & Liu, J. (2007). Survey of wireless indoor positioning techniques and systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37 (6), 1067–1080. https://doi.org/10.1109/TSMCC.2007.905750

Petrou, L., Larkou, G., Laoudias, C., Zeinalipour-Yazti, D., Panayiotou, C. G. (2014). Demonstration abstract: Crowdsourced indoor localization and navigation with anyplace. In IPSN-14 proceedings of the 13th international symposium on information processing in sensor networks (pp. 331–332). https://doi.org/10.1109/IPSN.2014.6846788 .

Agrawal, R., Kiernan, J., Srikant, R., Xu, Y. (2002). Chapter 14. Hippocratic databases. https://doi.org/10.1016/B978-155860869-6/50021-4 .

Gupta, A. K., & Shanker, U. (2020). A literature review of location-aware computing policies: Taxonomy and empirical analysis in mobile environment. International Journal of Mobile Human Computer Interaction (IJMHCI) , 12 (3), 21–45. https://doi.org/10.4018/IJMHCI.2020070102 .

Ben Sassi, I., Mellouli, S., & Ben Yahia, S. (2017). Context-aware recommender systems in mobile environment: On the road of future research. Information Systems, 72 , 27–61. https://doi.org/10.1016/j.is.2017.09.001

Gupta, A. K., Shanker, U. (2020). Some issues for location dependent information system query in mobile environment. In 29th ACM international conference on information and knowledge management (CIKM ’20) (p. 4). https://doi.org/10.1145/3340531.3418504 .

Ding, Z., Li, X., Jiang, C., & Zhou, M. (2018). Objectives and state-of-the-art of location-based social network recommender systems. ACM Computing Surveys (Csur), 51 (1), 1–28. https://doi.org/10.1145/3154526

Gupta, A. K., Shanker, U. (2018). Location dependent information system’s queries for mobile environment. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (vol. 10829) LNCS. https://doi.org/10.1007/978-3-319-91455-8_19 .

Takeuchi, Y., & Sugimoto, M. (2005). An outdoor recommendation system based on user location history. CEUR Workshop Proceedings, 149 , 91–100. https://doi.org/10.1007/11833529_64

Horozov, T., Narasimhan, N., & Vasudevan, V. (2006). Using location for personalized POI recommendations in mobile environments. International Symposium on Applications and the Internet (SAINT’06), 2006 , 6–129. https://doi.org/10.1109/SAINT.2006.55

Rslan, E., Abdelhameed, H., & Ezzat, E. (2018). An efficient hybridized index technique for moving object database. Spatial Information Research, 26 (5), 551–561. https://doi.org/10.1007/s41324-018-0198-7

Ilarri, S., Mena, E., & Illarramendi, A. (2010). Location-dependent query processing: Where we are and where we are heading? ACM Computing Surveys, 42 , 1–73.

Simon, R., Fröhlich, P. (2007). A mobile application framework for the geospatial web. In Proceedings of the 16th international conference on World Wide Web-WWW’07 (pp. 381–390). https://doi.org/10.1145/1242572.1242624 .

Zhang, G., Liu, L., Seshadri, S., Bamba, B., & Wang, Y. (2009). Scalable and reliable location services through decentralized replication. In Proc of the 7th IEEE international conference on web services (pp. 632–638). Los Angeles: IEEE Press.

Wu, S., & Wu, K.-T. (2003). Dynamic data management for location based services in mobile environments. Seventh International Database Engineering and Applications Symposium Proceedings, 2003 , 180–189. https://doi.org/10.1109/IDEAS.2003.1214925

Cao, Y., Yoshikawa, M. (2015). Differentially private real-time data release over infinite trajectory streams. In 2015 16th IEEE international conference on mobile data management (vol. 2, pp. 68–73). https://doi.org/10.1109/MDM.2015.15 .

Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M. (2006). L-diversity: Privacy beyond k-anonymity. In 22nd International conference on data engineering (ICDE’06) (p. 24). https://doi.org/10.1109/ICDE.2006.1 .

Duckham, M., & Kulik, L. (2005). A formal model of obfuscation and negotiation for location privacy. In H. W. Gellersen, R. Want, & A. Schmidt (Eds.), Pervasive Computing. Pervasive 2005 . Lecture notes in computer science (Vol. 3468, pp. 152–170). Berlin, Heidelberg: Springer. https://doi.org/10.1007/11428572_10 .

Chapter   Google Scholar  

Šikšnys, L., Thomsen, J. R., Šaltenis, S., Yiu, M. L., Andersen, O. (2009). A location privacy aware friend locator BT. Advances in spatial and temporal databases (pp. 405–410).

Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2008). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19 , 1719–1733. https://doi.org/10.1109/TKDE.2007.190662

Gambs, S., Killijian, M.-O., del Prado Cortez, M. N. (2010). Show me how you move and I will tell you who you are. In Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS (pp. 34–41). https://doi.org/10.1145/1868470.1868479 .

Gonzalez, M. C., Hidalgo, C., & Barabasi, A.-L. (2008). Understanding individual human mobility patterns. Nature, 453 , 779–782. https://doi.org/10.1038/nature06958

Song, C., Qu, Z., Blumm, N., & Barabasi, A.-L. (2010). Limits of predictability in human mobility. Science, 327 , 1018–1021. https://doi.org/10.1126/science.1177170

Article   MathSciNet   Google Scholar  

Gkoulalas-Divanis, A., Verykios, V. S. (2008). A free terrain model for trajectory K–anonymity BT. Database and expert systems applications (pp. 49–56).

Yoon, G., & Chow, J. (2020). Unlimited-ride bike-share pass pricing revenue management for casual riders using only public data. International Journal of Transportation Science and Technology . https://doi.org/10.1016/j.ijtst.2020.01.003

Hasan, A. S. M. T., Jiang, Q., & Li, C. (2017). An effective grouping method for privacy-preserving bike sharing data publishing. Future Internet, 9 , 65. https://doi.org/10.3390/fi9040065

Gruteser, M., Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services (pp. 31–42). https://doi.org/10.1145/1066116.1189037 .

Yu, R., Bai, Z., Yang, L., Wang, P., Move, O., & Liu, Y. (2016). A location cloaking algorithm based on combinatorial optimization for location-based services in 5G networks. IEEE Access, 4 , 6515–6527. https://doi.org/10.1109/ACCESS.2016.2607766

Feng, W., & Xie, H. (2017). Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access . https://doi.org/10.1109/ACCESS.2017.2679980

Wernke, M., Skvortsov, P., Dürr, F., & Rothermel, K. (2014). A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 18 (1), 163–175. https://doi.org/10.1007/s00779-012-0633-z

Xu, T., Cai, Y. (2009). Feeling-based location privacy protection for location-based services. In Proceedings of the ACM conference on computer and communications security (pp. 348–357). https://doi.org/10.1145/1653662.1653704 .

Samarati, P., Sweeney, L. (1998). Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems (p. 188). https://doi.org/10.1145/275487.275508 .

Sweeney, L. (2002). K-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 557–570. https://doi.org/10.1142/S0218488502001648

Raij, A., Ghosh, A., Kumar, S., Srivastava, M. (2011). Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 11–20). https://doi.org/10.1145/1978942.1978945 .

Domingo-Ferrer, J., Sramka, M., & Trujillo-Rasua, R. (2010). Privacy-preserving publication of trajectories using microaggregation. In E. Bertino (Ed.), Proceedings of the 3rd ACM SIGSPATIAL international workshop on security and privacy in GIS and LBS (SPRINGL 10), San Jose, CA, November 2–5, 2010 (pp. 26–33). Association for Computing Machinery.

Zhang, Z., Sun, Y., Xie, X., Pan, H. (2015). An efficient method on trajectory privacy preservation BT. Big data computing and communications (pp. 231–240).

Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 2 (1), 46–55. https://doi.org/10.1109/MPRV.2003.1186725

Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., & Fang, Y. (2012). Traffic-aware multiple mix zone placement for protecting location privacy. Proceedings IEEE INFOCOM, 2012 , 972–980. https://doi.org/10.1109/INFCOM.2012.6195848

Pfitzmann, A., Hansen, M. (2007). Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management–A consolidated proposal for terminology. Version v0, vol. 31.

Kwan, M.-P., Casas, I., & Schmitz, B. (2004). Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information Geovisualization, 39 , 15–28. https://doi.org/10.3138/X204-4223-57MK-8273

Liu, S., Qu, Q., Chen, L., & Ni, L. M. (2015). SMC: A practical schema for privacy-preserved data sharing over distributed data streams. IEEE Transactions on Big Data, 1 (2), 68–81. https://doi.org/10.1109/TBDATA.2015.2498156

Gupta, A. K., & Shanker, U. (2020). MAD-RAPPEL: Mobility aware data replacement & prefetching policy enrooted LBS. Journal of King Saud University - Computer and Information Sciences . https://doi.org/10.1016/j.jksuci.2020.05.007

Gupta, A. K., & Kumar, S. (2023). DSPPTD: Dynamic scheme for privacy protection of trajectory data in LBS. In S. Pandey, U. Shanker, V. Saravanan, & R. Ramalingam (Eds.), Role of data-intensive distributed computing systems in designing data solutions. EAI/Springer innovations in communication and computing . Cham: Springer. https://doi.org/10.1007/978-3-031-15542-0_4 .

Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P. (2007). Location privacy protection through obfuscation-based techniques BT. Data and applications security XXI (pp. 47–60).

Yoon, M., Kim, H., Jang, M., & Chang, J. (2013). Linear function based transformation scheme for preserving database privacy in cloud computing. International Conference on Parallel and Distributed Systems, 2013 , 498–503. https://doi.org/10.1109/ICPADS.2013.90

Mokbel, M. F., Chow, C.-Y. Y., Aref, W. G., Mokbel, M. F., Aref, W. G. (2006). The New Casper: Query processing for location services without compromising privacy 34 (4).

Ardagna, C. A., Cremonini, M., di Vimercati, S. D. C., & Samarati, P. (2011). An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing, 8 (1), 13–27. https://doi.org/10.1109/TDSC.2009.25

Gutscher, A (2006). Coordinate transformation: A solution for the privacy problem of location based services?. In Proceedings of the 2nd international conference on networking, In conjunction with international symposium on parallel and distributed processing (IPDPS) (pp. 1–1, vol. 2006). https://doi.org/10.1109/IPDPS.2006.1639681 .

Manweiler, J., Scudellari, R., Cox, L. P. (2009). SMILE: Encounter-based trust for mobile social services. In Proceedings of the 16th ACM conference on Computer and communications security , Chicago, Illinois, USA, November 9–13 (pp. 246–255). https://doi.org/10.1145/1653662.1653692 .

Hong, S., Liu, C., Ren, B., Huang, Y., & Junliang, C. (2017). Personal privacy protection framework based on hidden technology for smartphones. IEEE Access, 1 , 1. https://doi.org/10.1109/ACCESS.2017.2695561

Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W. (2009). CAP: A context-aware privacy protection system for location-based services. In 2009 29th IEEE international conference on distributed computing systems (pp. 49–57). https://doi.org/10.1109/ICDCS.2009.62 .

Hara, T., Suzuki, A., Iwata, M., Arase, Y., & Xie, X. (2016). Dummy-based user location anonymization under real-world constraints. IEEE Access, 4 , 1. https://doi.org/10.1109/ACCESS.2016.2526060

Niu, B., Li, Q., Zhu, X., Cao, G., Li, H. (2014). Achieving k-anonymity in privacy-aware location-based services. In IEEE INFOCOM 2014: IEEE conference on computer communications (pp. 754–762). https://doi.org/10.1109/INFOCOM.2014.6848002 .

Pingley, A., Zhang, N., Fu, X., Choi, H.-A., Subramaniam, S., & Zhao, W. (2011). Protection of query privacy for continuous location based services. In Proceedings IEEE INFOCOM, Shanghai, China, 2011 (pp. 1710–1718). https://doi.org/10.1109/INFCOM.2011.5934968 .

Suzuki, A., Iwata, M., Arase, Y., Hara, T., Xie, X., & Nishio, S. (2010). A user location anonymization method for location based services in a real environment. ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems , 2010 , 398–401. https://doi.org/10.1145/1869790.1869846 .

Kato et al., R. (2012). A dummy-based anonymization method based on user trajectory with pauses. In Proceedings of the 20th international conference on advances in geographic information systems (pp. 249–258). https://doi.org/10.1145/2424321.2424354 .

Tran, M., Echizen, I., Duong, A. (2010). Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services. In 2010 International conference on availability, reliability and security (pp. 580–585). https://doi.org/10.1109/ARES.2010.76 .

Lu, H., Jensen, C., & Yiu, M. (2008). PAD: Privacy-area aware, dummy-based location privacy in mobile services. ACM International Workshop on Data Engineering for Wireless and Mobile Access , 2008 , 16–23. https://doi.org/10.1145/1626536.1626540 .

Gupta, A. K. (2020). Spam mail filtering using data mining approach: A comparative performance analysis. In U. Shanker & S. Pandey (Eds.), handling priority inversion in time-constrained distributed databases (pp. 253–282). IGI Global. https://doi.org/10.4018/978-1-7998-2491-6.ch015 .

Serjantov, A., Danezis, G. (2003). Towards an information theoretic metric for anonymity BT. Privacy Enhancing Technologies (pp. 41–53).

Hu, H., Sun, Z., Liu, R., & Yang, X. (2019). Privacy implication of location-based service: Multi-class stochastic user equilibrium and incentive mechanism. Transportation Research Record, 2673 (12), 256–265. https://doi.org/10.1177/0361198119859322

Gupta, A. K., & Shanker, U. (2020). Study of fuzzy logic and particle swarm methods in map matching algorithm. SN Applied Sciences , 2 , 608. https://doi.org/10.1007/s42452-020-2431-y .

Gupta, A. K., & Shanker, U. (2022). A comprehensive review of map-matching techniques: Empirical analysis, taxonomy, and emerging research trends. International Journal of Web Services Research (IJWSR) , 19 (1), 1–32. https://doi.org/10.4018/IJWSR.306243 .

Gupta, A. K. & Shanker, U. (2022). Integration and study of map matching algorithms in healthcare services for cognitive impaired person. In Cognitive data science in sustainable computing, edge-of-things in personalized healthcare support systems, Academic Press (pp. 187–216). https://doi.org/10.1016/B978-0-323-90585-5.00008-4

Gupta, A. K., & Shanker, U. (2021). Prediction and anticipation features-based intellectual assistant in location-based services. International Journal of System Dynamics Applications (IJSDA) , 10 (4), 1–25. https://doi.org/10.4018/IJSDA.20211001.oa4 .

Hong, J., & Gruteser, M. (2003). Wireless location privacy protection. IEEE Computer, 36 , 135–137. https://doi.org/10.1109/MC.2003.1250896

Yiu, M., Ghinita, G., Jensen, C., & Kalnis, P. (2010). Enabling search services on outsourced private spatial data. The VLDB Journal, 19 , 363–384. https://doi.org/10.1007/s00778-009-0169-7

Sule, R., Chaudhari, S. (2018). Preserving location privacy in geosocial applications using error based transformation .

Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C. (2006). Anonymous user tracking for location-based community services. In Proceedings of the second international conference on location- and context-awareness (pp. 116–133). https://doi.org/10.1007/11752967_9 .

Indyk, P., Woodruff, D. (2006). Polylogarithmic private approximations and efficient matching BT . Theory of cryptography (pp. 245–264).

Khoshgozaran, A., Shahabi, C. (2007). Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy BT. Advances in spatial and temporal databases (pp. 239–257).

Jung, T., Li, X., Wan, Z., & Wan, M. (2013). Privacy preserving cloud data access with multi-authorities. Proceedings IEEE INFOCOM, 2013 , 2625–2633. https://doi.org/10.1109/INFCOM.2013.6567070

Li, X., & Jung, T. (2013). Search me if you can: Privacy-preserving location query service. Proceedings IEEE INFOCOM, 2013 , 2760–2768. https://doi.org/10.1109/INFCOM.2013.6567085

Lu, R., Lin, X., Shi, Z., Shao, J. (2014). PLAM: A privacy-preserving framework for local-area mobile social networks .

Zhu, X., Chi, H., Jiang, S., Lei, X., & Li, H. (2014). Using dynamic pseudo-IDs to protect privacy in location-based services. IEEE International Conference on Communications (ICC), 2014 , 2307–2312. https://doi.org/10.1109/ICC.2014.6883667

Shao, J., Lu, R., Lin, X. (2014). FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. In IEEE INFOCOM 2014 - IEEE conference on computer communications (pp. 244–252). https://doi.org/10.1109/INFOCOM.2014.6847945 .

Yi, X., Paulet, R., Bertino, E., Varadharajan, V. (2014). Practical k nearest neighbor queries with location privacy. In 2014 IEEE 30th international conference on data engineering (pp. 640–651). https://doi.org/10.1109/ICDE.2014.6816688 .

Zhao, X., Gao, H., Li, L., Liu, H., & Xue, G. (2014). An efficient privacy preserving location based service system. IEEE Global Communications Conference, 2014 , 576–581. https://doi.org/10.1109/GLOCOM.2014.7036869

Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable Secure Computing, 11 (3), 266–279. https://doi.org/10.1109/TDSC.2013.57

Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., & Li, H. (2013). MobiCache: When k-anonymity meets cache. IEEE Global Communications Conference (GLOBECOM), 2013 , 820–825. https://doi.org/10.1109/GLOCOM.2013.6831174

Gupta, A. K., & Kumar, S. (2023). A predicted region enrooted approach for efficient caching in mobile environment. Journal of Information Science and Engineering , 39 (1), 111–127. https://doi.org/10.6688/JISE.202301_39(1).0007 .

Gupta, A. K., & Shanker, U. (2020). OMCPR: Optimal mobility aware cache data pre-fetching and replacement policy using spatial K-anonymity for LBS. Wireless Personal Communications, 114 (2), 949–973. https://doi.org/10.1007/s11277-020-07402-2

Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2015). Enhancing privacy through caching in location-based services. IEEE Conference on Computer Communications (INFOCOM), 2015 , 1017–1025. https://doi.org/10.1109/INFOCOM.2015.7218474

Gupta, A. K., & Shanker, U. (2018). CELPB: A cache invalidation policy for location dependent data in mobile environment. In 22nd international database engineering applications symposium (IDEAS 2018), Calabria, Italy, June 18-20, 2018 (pp. 302–306).

Gupta, A. K., & Shanker, U. (2021). Mobility-Aware prefetching and replacement scheme for location-based services: MOPAR. In P. Saravanan & S. Balasundaram (Eds.), Privacy and security challenges in location aware computing (pp. 26–51). IGI Global. https://doi.org/10.4018/978-1-7998-7756-1.ch002 .

Gupta, A. K., & Shanker, U. (2021). CEMP-IR: A novel location aware cache invalidation and replacement policy. International Journal of Computational Science and Engineering , 24 (5), 450–462.

Gupta, A. K., & Shanker, U. (2021). Mobility Markov chain and matrix-based location-aware cache replacement policy in mobile environment: MMCM-CRP. International Journal of Software Innovation (IJSI) , 9 (4), 88–106. https://doi.org/10.4018/IJSI.289171 .

Liu, B., Zhou, W., Zhu, T., Zhou, H., & Lin, X. (2016). Invisible hand: A privacy preserving mobile crowd sensing framework based on economic models. IEEE Transactions on Vehicular Technology, 1 , 1. https://doi.org/10.1109/TVT.2016.2611761

Thilliez, M., Delot, T., & Lecomte, S. (2005). An original positioning solution to evaluate location-dependent queries in wireless environments. Journal of Digital Information Management, 3 (2), 108.

Google Scholar  

Zhu, X., Zhu, G., Guan, P. (2013). Exploring location-aware process management BT: Geo-Informatics in resource management and sustainable ecosystem. In Geo-Informatics in resource management and sustainable ecosystem (vol. 399, pp. 249–256).

Liang, T. Y., & Li, Y. J. (2017). A location-aware service deployment algorithm based on k-means for cloudlets. Mobile Information Systems, 2017 (January), 10–21. https://doi.org/10.1155/2017/8342859

Gupta, A. K., & Shanker, U. (2021). An efficient Markov chain model development based prefetching in location-based services. In P. Saravanan & S. Balasundaram (Eds.), Privacy and security challenges in location aware computing (pp. 109–125). IGI Global. https://doi.org/10.4018/978-1-7998-7756-1.ch005

Shen, H., Bai, G., Yang, M., & Wang, Z. (2017). Protecting trajectory privacy: A user-centric analysis. Journal of Network and Computer Applications, 82 , 128–139. https://doi.org/10.1016/j.jnca.2017.01.018

Li, X., Zhu, Y., Wang, J., Liu, Z., Liu, Y., & Zhang, M. (2018). On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Transactions on Dependable and Secure Computing, 15 (5), 906–912. https://doi.org/10.1109/TDSC.2017.2682244

Gupta, A. K., Prakash, S. (2018). Secure communication in cluster-based ad hoc networks: a review. In Advances in intelligent systems and computing (pp. 537–545).

Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94 , 40–50. https://doi.org/10.1016/j.future.2018.10.053

Gao, S., Ma, J., Shi, W., Zhan, G., & Sun, C. (2013). TrPF: A trajectory privacy-preserving framework for participatory sensing. IEEE Transactions on Information Forensics and Security, 8 , 874–887. https://doi.org/10.1109/TIFS.2013.2252618

Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Transactions on Mobile Computing, 14 (3), 495–508. https://doi.org/10.1109/TMC.2014.2321747

Mascetti, S., Bettini, C., Wang, X. S., Freni, D., Jajodia, S. (2009). ProvidentHider: An algorithm to preserve historical k-anonymity in LBS. In 2009 Tenth international conference on mobile data management: systems, services and middleware (pp. 172–181). https://doi.org/10.1109/MDM.2009.28 .

Zhong, G., & Hengartner, U. (2009). A distributed k-anonymity protocol for location privacy. IEEE International Conference on Pervasive Computing and Communications, 2009 , 1–10. https://doi.org/10.1109/PERCOM.2009.4912774

Kido, H., Yanagisawa, Y., Satoh, T. (2005). An Anonymous Communication Technique using Dummies for Location-based Services (vol. 88–97).

You, T., Peng, W., & Lee, W. (2007). Protecting moving trajectories with dummies. International Conference on Mobile Data Management, 2007 , 278–282. https://doi.org/10.1109/MDM.2007.58

Xiao, Y., Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 1298–1309). https://doi.org/10.1145/2810103.2813640 .

Hwang, R., Hsueh, Y., & Chung, H. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7 (2), 126–139. https://doi.org/10.1109/TSC.2013.55

Terrovitis, M., & Mamoulis, N. (2008). Privacy preservation in the publication of trajectories. The Ninth International Conference on Mobile Data Management (mdm 2008) , 65–72. https://doi.org/10.1109/MDM.2008.29

Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, L. (2008). Private queries in location based services: Anonymizers are not necessary. SIGMOD Conference , 2008 , 121–132. https://doi.org/10.1145/1376616.1376631 .

Download references

Author information

Authors and affiliations.

Department of CSE, M. M. M. University of Technology, Gorakhpur, 273010, India

Ajay K. Gupta & Udai Shanker

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ajay K. Gupta .

Ethics declarations

Conflict of interest.

The corresponding author declare no conflict of interest case arise in writing this survey paper.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Gupta, A.K., Shanker, U. Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research Directions. Wireless Pers Commun 134 , 1617–1639 (2024). https://doi.org/10.1007/s11277-024-10977-9

Download citation

Accepted : 21 December 2023

Published : 06 April 2024

Issue Date : February 2024

DOI : https://doi.org/10.1007/s11277-024-10977-9

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Location-based service
  • Applications & services
  • Context-aware mobility
  • Mobile computing & networking
  • Security & services
  • Find a journal
  • Publish with us
  • Track your research

Research on unmanned multi-mode wireless cooperative communication

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. Applications of 5G wireless communication

    research issues in wireless communication

  2. (PDF) Wireless communication technologies for the Internet of Things

    research issues in wireless communication

  3. (PDF) IEEE Access Special Section Editorial: Security in Wireless

    research issues in wireless communication

  4. (PDF) Wireless Communication: Advancements and Challenges

    research issues in wireless communication

  5. Wireless Communications and Spectrum Management by the FCC and NTIA

    research issues in wireless communication

  6. (PDF) Online Deep Learning in Wireless Communication Systems

    research issues in wireless communication

VIDEO

  1. Advanced topic in wireless communication Assignment No 01 (NPTEL 2024)

  2. Wireless communication Terminologies

  3. Intuitive Understanding of wireless communication systems PART1

  4. Lecture 06

  5. RF module 433 MHz wireless communication project #shorts #youtube #trending #viral #diy #reels

  6. Lecture on Recent Trends in Wireless Sensor Networks

COMMENTS

  1. 5G, 6G, and Beyond: Recent advances and future challenges

    With the high demand for advanced services and the increase in the number of connected devices, current wireless communication systems are required to expand to meet the users' needs in terms of quality of service, throughput, latency, connectivity, and security. 5G, 6G, and Beyond (xG) aim at bringing new radical changes to shake the wireless communication networks where everything will be ...

  2. 6G Wireless Communication Systems: Applications, Requirements

    The demand for wireless connectivity has grown exponentially over the last few decades. Fifth-generation (5G) communications, with far more features than fourth-generation communications, will soon be deployed worldwide. A new paradigm of wireless communication, the sixth-generation (6G) system, with the full support of artificial intelligence, is expected to be implemented between 2027 and ...

  3. Multi-band Wireless Communication Networks: Fundamentals, Challenges

    This paper explores the evolution of wireless communication networks from utilizing the sub-6 GHz spectrum and the millimeter wave frequency band to incorporating extremely high frequencies like optical and terahertz for 6G and beyond. While these higher frequencies offer broader bandwidths and extreme data rate capabilities, the transition from single-band and heterogeneous networks to multi ...

  4. 5G mobile networks and health—a state-of-the-science review of the

    The increased use of radiofrequency (RF) fields above 6 GHz, particularly for the 5 G mobile phone network, has given rise to public concern about any possible adverse effects to human health.

  5. Future Wireless Communications Systems and Protocols

    Summary. 5G and beyond communications will include several technical advancements that enable innovative applications such as wireless backhauling, Augmented/Virtual Reality (AR/VR), 8K video streaming and sensing. This project is focused on system-level insights and performance analyses of emerging wireless protocols and standards.

  6. Wireless communications sensing and security above 100 GHz

    The field of terahertz wireless communication is growing rapidly. Here the authors discuss the challenges for the architectures of wireless platforms above 100 GHz and their potential applications.

  7. Intelligent Wireless Networks: Challenges and Future Research Topics

    1. Zhao Y Li Y Zhang X Geng G Zhang W Sun Y A survey of networking applications applying the software defined networking concept based on machine learning IEEE Access 2019 7 95397 95417 Google Scholar Cross Ref; 2. Elsayed M Erol-Kantarci M AI-enabled future wireless networks: challenges, opportunities, and open issues IEEE Veh. Technol. Mag. 2019 14 3 70 77 Google Scholar Cross Ref

  8. Recent Progress in Wireless Communication Networks

    This Special Issue aims to show the progress achieved in wireless communication networks. Original and unpublished studies are welcomed. This Special Issue's research scope includes, but is not limited to, the following topics: wireless communication for green IoT; beyond 5G/6G; communication and energy efficiency; wireless sensing; video ...

  9. Interplay between RIS and AI in Wireless Communications: Fundamentals

    assisting wireless communication systems as early as 5G. Moreover, AI has the potential to satisfy the performance of future wireless communication networks and play a major role in the link-level and system-level solutions of 6G. The RIS-based wireless communication frameworks and AI-enabled technologies, two of the promising technologies for ...

  10. Recent Challenges & Avenues in Wireless Communication through Advance

    Research on neural network chaotic encryption algorithm in wireless network security communication The rapid development of wireless network brings a lot of convenience to people's lives, but there are still many problems to be solved in wireless networks.

  11. PDF A Survey of Recent Advances in Optimization Methods for Wireless

    above mentioned wireless communication technologies. It is widely recognized as a powerful and indispensable model-ing and solution tool in the systematic design of wireless communication systems. Indeed, many problems arising from wireless communication system design can be formulated as mathematical optimization problems and efficiently solved by

  12. Study and Investigation on 5G Technology: A Systematic Review

    1. Introduction. Most recently, in three decades, rapid growth was marked in the field of wireless communication concerning the transition of 1G to 4G [1,2].The main motto behind this research was the requirements of high bandwidth and very low latency. 5G provides a high data rate, improved quality of service (QoS), low-latency, high coverage, high reliability, and economically affordable ...

  13. (PDF) Grand Challenges in Wireless Communications

    wireless systems are outlined in the following. GRAND CHALLENGE 1: SECURITY, SECRECY, AND PRIVACY. Wireless communication systems are carrying a growing amount of confidential information. The ...

  14. A comprehensive survey 5G wireless communication systems: open issues

    The article also reviews the architecture and design issues that are mere requirement for 5G wireless communication systems. Applications of 5G wireless communication User centric network

  15. Advancements in Wireless Communications, Networks and Signal ...

    Although fifth-generation (5G) wireless communication can ] support well a high data rate of transmission, issues such as base station (BS) failure and poor BS signals may cause serious interruption problems. This paper studies the user-BS selection strategy with received signal strength indication (RSSI)-based reliability in 5G wireless networks.

  16. (PDF) Advancements in Wireless Communication

    SSRG International Journal of Electronics and Communication En gineering (SSRG-IJECE) - Volume 7 Issue - 9 Sep 2020. ISSN: 2348 - 8549 www.internationaljournalssrg.org Page 1. Advancements ...

  17. Security in Wireless Communication Networks

    Abstract: Over the last decade, wireless networks have experienced significant growth due to the proliferation of mobile devices and new development of radio technologies. Since the very beginning, security for wireless communication networks has always been regarded as a critical issue. In recent research frenzy on 5G and V2X communications, security plays a pivotal role as wireless Internet ...

  18. Wi-Fi Technology and Human Health Impact: A Brief Review of Current

    An enormous increase in the application of wireless communication in recent decades has intensified research into consequent increase in human exposure to electromagnetic (EM) radiofrequency (RF) radiation fields and potential health effects, especially in school children and teenagers, and this paper gives a snap overview of current findings and recommendations of international expert bodies ...

  19. Future Wireless Communication Technology towards 6G IoT: An Application

    Future Wireless Communication Technology towards 6G IoT: An Application-Based Analysis of IoT in Real-Time Location Monitoring of Employees Inside Underground Mines by Using BLE ... The authors focused on the recent approaches, research issues and key challenges of IoT network topology and terahertz (Tz) frequency. A comprehensive survey of ...

  20. PDF Research Issues for Sustainable Wireless Networks: A Stakeholder Approach

    Research Issues for Sustainable Wireless Networks: A Stakeholder Approach. Marja Matinmikko-Blue Centre for Wireless Communications University of Oulu Oulu, Finland [email protected]. Abstract—Sustainability and sustainable development are topics that are increasingly addressed in the ICT sector including wireless networks.

  21. Research challenges in wireless networks: a technical overview

    Abstract: This technical overview outlines some key network research issues, and differentiates the features of wireless networks and the services that they will support. As the Internet becomes ubiquitously delivered on mobile platforms, new approaches to wireless networking that build upon the advances of wireline networks and cellular system design will be required.

  22. Application of Internet-of-Things Wireless Communication Technology in

    The research status of the above wireless communication technology in agricultural irrigation management is discussed, and the agricultural irrigation management example using the above wireless communication technology is also presented. ... Finally, this paper analyzes the challenges of data security issues, data fusion problems, intelligent ...

  23. (PDF) Wireless Communication through networks and its ...

    Wireless Access Report: Security Issues dog hotspots. Network Week Panko, R. R. (2004). Business Data Networks and Telecommunications (5 Ed). ... Interested in research on Wireless Communications?

  24. Location Privacy Preservation for Location Based Service ...

    Context-aware computing processes the mobile user's query/transaction submitted from anywhere at any time. Basically, location based services (LBSs) are continuous, local, and spatially confined applications of computing in the context-aware mobile environment, where queries/transactions are initiated by the mobile users. The smartphones as a resultant of today's advanced mobile ...

  25. Research on unmanned multi-mode wireless cooperative communication

    Abstract: Aiming at the communication technology problems of unmanned vehicles in the multimode wireless communication environment, firstly, the multimode communication technology is analyzed in depth and its application is combined with the actual scene. Secondly, for the characteristics of real-time data transmission requirements of unmanned vehicles, a multilevel priority feedback control ...