2024
DOI: 10.1109/mcom.001.2200421
|View full text |Cite
|
Sign up to set email alerts
|

Terahertz Communications for Massive Connectivity and Security in 6G and Beyond Era

Abstract: Terahertz (THz) communications (THzCom) has experienced a meteoric rise of interest, due to its benefits for ultra-high data rate transmission in the sixth generation (6G) and beyond era. Despite so, the research on exploring the potential of THzCom for other performance targets anticipated by 6G, including massive connectivity and security, is still in its infancy. In this article, we start with briefly describing the unique peculiarities of THz channels, and then discuss theoretical frameworks to facilitate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…T ERAHERTZ (THz) band, spanning from 0.1 THz to 10 THz, offers gigahertz-level bandwidth to support massive connectivity [1], ultimate wireless virtual reality (VR) [2] and other huge-capacity demanded applications in envisioned sixth-generation (6G) communication [3]. Despite its bandwidth potential, THz communications still face severe path loss challenges due to its high-frequency loss and atmospheric absorption in air [4].…”
Section: Introductionmentioning
confidence: 99%
“…T ERAHERTZ (THz) band, spanning from 0.1 THz to 10 THz, offers gigahertz-level bandwidth to support massive connectivity [1], ultimate wireless virtual reality (VR) [2] and other huge-capacity demanded applications in envisioned sixth-generation (6G) communication [3]. Despite its bandwidth potential, THz communications still face severe path loss challenges due to its high-frequency loss and atmospheric absorption in air [4].…”
Section: Introductionmentioning
confidence: 99%
“…Also, resource-constrained IoT nodes have practical constraints such as limited energy, leading to the use of lightweight secrecy protocols to reduce the demand for resources. To this end, various physical-layer security (PLS) techniques have been investigated to provide protection through wiretap coding and smart signaling by exploiting the physical-layer properties of wireless channels [9]- [13].…”
Section: Introductionmentioning
confidence: 99%
“…Last but not least, PLS has good compatibility with existing wireless communication systems, such as heterogeneous networks, visible light communication (VLC) systems, non-orthogonal multiple access (NOMA) networks, millimeter-wave networks, space-air-ground integrated network [6], and so on. In other words, PLS does not require large-scale modification or upgrading of existing systems, which means that PLS can be easily applied to a variety of communication scenarios and devices [7]- [21]. However, the PLS techniques also have some shortcomings.…”
Section: Introductionmentioning
confidence: 99%