Mobile Computing and Secure Communication Technologies in 6G Networks
1Harbin Engineering University, Harbin, China
2Lviv Polytechnic National University, Lviv, Ukraine
3Nanchang Institute of Technology, Nanchang, China
Mobile Computing and Secure Communication Technologies in 6G Networks
Description
The next generation of wireless communications networks, i.e., 6G, is designed to support a massive number of users’ connectivity and a multi-gigabit transmission rate, which can realise the integration of space, aerial, terrestrial, and undersea networks. The overall goal is to provide ubiquitous Internet-of-Things (IoT) communication services for machines, mobile devices, and users with different quality of service (QoS) requirements, to support diversified and heterogeneous emergent information interaction needs, and to protect user privacy communication protocols, transceivers, and computing technologies under the premise of normal communication.
Out of the multiple innovation goals for 6G networks, mobile computing and secure communication technologies are critical to improving quality-of-experience (QoE) and information security from both a multi-communication environment and a personal or business perspective. To this end, in recent years, advanced and ubiquitous applications and increasing design demand have begun to improve data processing speed and user privacy from physical layer and upper layer perspectives. One of the goals of mobile computing and secure communication is to deal with the need for separate data processing on heterogeneous devices and effectively reduce latency by moving data-intensive processing from cloud servers to edge computing devices. However, dealing with the large amount of unstructured/semi-structured data generated by resource-constrained IoT users in an efficient and secure manner is an important issue that needs to be addressed. In addition, it is difficult to define the rationality and universality of the performance evaluation function designed for actual mobile computing/secure systems, especially for the design of edge computing IoT physical layers on the composite ultra-dense scale. In addition, multiple composite performance evaluations such as cost, delay, and security capacity need to be considered comprehensively. Until now, limited research efforts have been made and few papers have been published on mobile computing and secure communication for 6G networks.
This Special Issue aims to provide a platform for researchers from academia and industry to discuss innovative solutions to key issues in these technologies for future 6G networks. We have an interest in submissions on mobile computing and secure communication working to dramatically improve the performance of 6G networks. We welcome both original research and review articles.
Potential topics include but are not limited to the following:
- Trustworthy blockchain-based secure network structure design in 6G networks
- Self-organisation and self-healing techniques for sustainable mobile computing/secure 6G networks
- Energy harvesting enabled secure Internet-of-Everything in 6G networks
- Co-time co-frequency full duplex applications for secure/mobile computing massive MIMO in 6G networks
- Intelligent secure network slicing management and challenges in 6G networks
- Energy-aware massive MIMO systems with physical layer security in 6G networks
- Blockchain and artificial intelligence (AI) for dynamic secure spectrum sharing in 6G networks
- Architectures/topologies for secure hierarchical IoT-cloud/fog/mist networks