Open Access
REVIEW
6G-Enabled Internet of Things: Vision, Techniques, and Open Issues
1
Pattern Recognition and Machine Learning Lab, Gachon University, Seongnam, 13120, Korea
2
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, 1477893855, Iran
3
Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, 64002, Taiwan
* Corresponding Author: Amir Masoud Rahmani. Email:
Computer Modeling in Engineering & Sciences 2022, 133(3), 509-556. https://doi.org/10.32604/cmes.2022.021094
Received 27 December 2021; Accepted 28 March 2022; Issue published 03 August 2022
Abstract
There are changes in the development of wireless technology systems every decade. 6G (sixth generation) wireless networks improve on previous generations by increasing dependability, accelerating networks, increasing available bandwidth, decreasing latency, and increasing data transmission speed to standardize communication signals. The purpose of this article is to comprehend the current directions in 6G studies and their relationship to the Internet of Things (IoT). Also, this paper discusses the impacts of 6G on IoT, critical requirements and trends for 6G-enabled IoT, new service classes of 6G and IoT technologies, and current 6G-enabled IoT studies selected by the systematic literature review (SLR) method published from 2018 to 2021. In addition, we present a technical taxonomy for the classification of 6G-enabled IoT, which includes self-organization systems, energy efficiency, channel assessment, and security. Also, according to the articles reviewed, we consider the evaluation factors in this domain, including data transmission, delay, energy consumption, and bandwidth. Finally, we focus on open issues and future research challenges in 6G-enabled IoT. To mention important future challenges and directions, we can point to migration, data storage, data resource, data security, data sharing, data offloading, availability, scalability, portability, user experience, reliability, authentication, and authorization.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.