U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Sensors (Basel)

Logo of sensors

Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review

Mamoona majid.

1 School of System and Technology, University of Management and Technology, Lahore 54782, Pakistan; [email protected] (M.M.); [email protected] (S.H.)

Shaista Habib

Abdul rehman javed.

2 Department of Cyber Security, PAF Complex, E-9, Air University, Islamabad 44000, Pakistan; [email protected]

Muhammad Rizwan

3 Department of Computer Science, Kinnaird College for Women, Lahore 54000, Pakistan; [email protected]

Gautam Srivastava

4 Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada; ac.unodnarb@gavatsavirs

5 Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan

Thippa Reddy Gadekallu

6 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore 632014, Tamil Nadu, India; [email protected]

Jerry Chun-Wei Lin

7 Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway

Associated Data

The data presented in this study are available on request from the corresponding author.

The 21st century has seen rapid changes in technology, industry, and social patterns. Most industries have moved towards automation, and human intervention has decreased, which has led to a revolution in industries, named the fourth industrial revolution (Industry 4.0). Industry 4.0 or the fourth industrial revolution (IR 4.0) relies heavily on the Internet of Things (IoT) and wireless sensor networks (WSN). IoT and WSN are used in various control systems, including environmental monitoring, home automation, and chemical/biological attack detection. IoT devices and applications are used to process extracted data from WSN devices and transmit them to remote locations. This systematic literature review offers a wide range of information on Industry 4.0, finds research gaps, and recommends future directions. Seven research questions are addressed in this article: (i) What are the contributions of WSN in IR 4.0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the major types of network intruders in WSN and IoT systems? (v) What are the prominent network security attacks in WSN and IoT? (vi) What are the significant issues in IoT and WSN frameworks? and (vii) What are the limitations and research gaps in the existing work? This study mainly focuses on research solutions and new techniques to automate Industry 4.0. In this research, we analyzed over 130 articles from 2014 until 2021. This paper covers several aspects of Industry 4.0, from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.

1. Introduction

Smart technologies play a crucial role in sustainable economic growth. They transform houses, offices, factories, and even cities into autonomic, self-controlled systems without human intervention [ 1 ]. This modern automation trend and ever-increasing use of cutting-edge technologies are boosting the world’s economy [ 2 ]. The Internet of Things (IoT) and Wireless Sensor Networks (WSN) both play vital roles in this modernization [ 3 ]. IoT is a branch of engineering primarily concerned with offering thousands of miniature, physical connected objects, which may collaborate to achieve a shared goal. IoT has gained much importance due to the abundant usage of these tiny networked devices. These are smart, yet basic things that can sense and communicate wirelessly [ 4 ]. WSN is a collection of sensor and routing nodes, as shown in Figure 1 , which may be put together in the environment to predict physical conditions, such as wind, temperature, and many others. These networks collect and process data from tiny nodes and then transfer it to the operators. Figure 2 illustrates that sensor networks are used in a variety of control systems, including environmental monitoring, home automation, chemical and biological assault detection, smart grid deployment [ 5 ], surveillance, and many more. WSN also plays a significant role in aquaculture and the oil industry, including data collection, offshore exploration, disaster prevention, tactical surveillance, and pollution monitoring [ 6 , 7 , 8 ].

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g001.jpg

Architecture of wireless sensor network (WSN).

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g002.jpg

Application of wireless sensor network (WSN).

WSN are often deployed in remote areas where human intervention is not possible for post-deployment maintenance. Therefore, efforts are being made to enhance their efficiency and durability [ 9 ]. There are many barriers to WSN deployment, such as power consumption–long-distance deployment. Due to automation trends and applications developed, these barriers are no longer barriers for large-scale remote deployment. In general, WSN follows a star topology to decrease the network failure probability by connecting all systems to a central node. While ad-hoc networks follow mesh topology where each node is human-driven [ 10 ].

In physical production systems, grid and energy-saving applications minimize the energy resources and noise pollution. In the last few decades, transportation has improved a lot with the usage of smart IoT devices, such as signals and high-resolution cameras on roads, which has led to an increase in traffic flow. RFID readers are deployed at toll booths that automatically deduct toll amounts after reading RFID tags on vehicles. In the transportation sector, smart vehicles reduce the travelling time and also fuel consumption with low cost of mobility and reduced human efforts [ 11 ], atmospheric monitoring reduces pollution, and surveillance applications reduce crime. Nowadays, WSN also plays a role in precision agriculture. On the other hand, WSN applications facilitate our day to day lives, making them more comfortable, such as healthcare applications that improve our health and longevity.

Besides WSN, IoT has also played an important role in human life. IoT and the digital age play essential roles in overcoming social and physical barriers and providing ease and mobility to people, resulting in improved and equal opportunities, and access to information [ 12 , 13 ]. IoT also has many application areas such as agribusiness, climate, clinical care, education, transportation, and finance, as shown in Figure 2 .

In regard to information and communication technology, researchers are attracted to IoT [ 14 ]. By adopting this essential technology, companies have become smarter, more competitive, automated, and sustainable in the global supply chain. In today’s competitive marketplace, supply chains are struggling as they compete with each other. Therefore, IoT devices are an effective way to authenticate, monitor, and track products using GPS and many technologies [ 15 , 16 ]. Industry 4.0 stands for the fourth industrial revolution in the digital age, it is associated with virtualizing real-world scenarios of production and processing without human intervention. This virtual world is linked to IoT devices, allowing the creation of cyber–physical systems to communicate and cooperate [ 17 , 18 ]. This fully connected manufacturing system—operating without human intervention by generating, transferring, receiving, and processing necessary data to conduct all required tasks for producing all kinds of goods—is one of Industry 4.0’s key “constructs”. The concept of Industry 4.0 is based on the combination of three main elements: people, things, and business [ 19 ]. A complete cyber–physical production system created by the integration of IoT devices, things and objects (IoT), sensor nodes (WSN), and people, is shown in Figure 3 . CPS is a typical example of Industry 4.0. IoT is the connection of smart devices, objects, or machines to the internet and with each other. In WSN systems, there is no direct connection of these devices to the Internet. These systems can send their data to the Internet by connecting several sensor nodes to a central routing node. While CPS systems involve the integration of IoT devices, computation, networking, and physical process, IoT is an essential component of CPS. CPS systems are key elements in the implementation of IR 4.0 [ 20 ]. Industry 4.0 is the network-enabled entity that automates the whole process of manufacturing, connecting business and processes. Market demands and the advancements in new technologies are transforming manufacturing firms’ business operations into smart factories and warehouses. Due to this automation, IoT devices are producing a massive amount of data daily, known as big data [ 21 , 22 ]. Statistics show that, at the end of 2021, there were more than 10 billion active IoT devices globally [ 23 ]. By 2030, the number of active IoT devices is expected to exceed 10 billion to 25.4 billion. By 2025, the data created by IoT devices will reach 73.1 ZB (zeta bytes) [ 24 ]. In 2020, the IoT industry was predicted to generate more than USD 450 billion, including hardware, software, systems integration, and data services. By the end of 2021, it reached USD 520 billion. The global amount expected to be spent on the IoT in 2022 is USD 1 trillion. The IoT industry is predicted to grow to more than USD 2 trillion by 2027 [ 25 , 26 ]. The increasing number of devices and the usage by humans shows the importance of IoT devices; moreover, the industry is growing and gaining revenue.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g003.jpg

CPS system–integration of IoT, wireless devices, and people in Industry 4.0.

In this paper, we conduct a detailed systematic literature review on the applications and contributions of IoT and WSN in Industry 4.0. We had a large corpus of data to analyze papers using systematic approaches. Among the selected articles, we obtained 22 articles describing the detailed review of existing security techniques, applications used, advantages/disadvantages, and limitations of IoT and WSN. Most of them reviewed the articles in terms of application of IoT and attacks only. The paper mainly focuses on research challenges, issues, limitations, and the future direction of IoT and WSN frameworks in Industry 4.0.

1.1. Motivation

The primary motivation for performing SLR is the ever-increasing trend of automation in Industry 4.0. Industry 4.0 is made up of both WSN technology and IoT to digitize work. Over time, we see how digitization and technology are replacing people in the workplace, and dramatically changing the global workforce. Technology has brought ease to human life and the efficiency of things by making them eco-friendly, more agile, and productive. From smart cities to smart industries, a drastic change has happened due to the intelligent usage of IoT and WSN and IR 4.0. For example, a smart factory integrates virtual and physical systems and calibrating instruments to record their readings immediately. In short, the integration of IoT and WSN with Industry 4.0 has reduced labour needs, freed humans from low-level skilled work, and improved the quantity and quality of work. Therefore, To achieve better analysis results, we systematically analyzed almost all research data related to IoT and WSN domains in Industry 4.0.

1.2. Contribution

From smart factories to individual lives, IoT and WSN play significant roles. There are many advantages, but security problems have arisen as these devices generate considerable amounts of data daily. These papers amalgamated both sides: IoT and WSN contributions and their security risks. This paper focuses more on the contributions of IoT and WSN in Industry 4.0 and presents an in-depth review and analysis of IoT and WSN. The paper’s main contribution involves formulating research questions from filtered data and building a strong work foundation using SLR methods. We discuss various applications and security attacks in IR 4.0. Furthermore, new findings of the paper pertain to the key challenges and open issues of WSN integrated with IoT in Industry 4.0, to optimize different criteria.

1.3. Paper Organization

The remainder of the paper is organized into the following sections. Table 1 presents the notation used in the entire paper. Section 2 provides the related works. Comparative analyses of these review papers are given in Table 2 . Section 3 presents a detailed systematic literature survey (SLR). Research questions presented in Table 3 are addressed in Section 4 . Section 5 presents the challenges and issues. Future directions are elaborated in Section 6 . Finally, the conclusion is presented in Section 7 .

List of Abbreviations.

AbbreviationDescription
5Gfifth generation
6Gsixth generation
ARaugmented reality
CPScyber physical system
DDoSdistributed denial of service
DNSdomain name system
DoSdenial of service
DTdigital twin
FoIfield of interest
GUIgraphical user interface
ID 4.0Industry 4.0
IIoTindustrial internet of things
IoTinternet of things
IR 4.0industry revolution 4.0
IWSNindustrial wireless sensor network
IWSANindustrial wireless sensor and actuator network
PREQrequest packet
QoSquality of service
RFIDradio frequency identification
SEPTICself protecting databases from attacks
SGsmart grid
SIRPself-optimized smart routing protocol
SLRsystematic literature review
UASNunderwater acoustic sensor networks
WSNwireless sensor network
WSANwireless sensor area network

Comparative analysis of the existing review papers. Key: deployment category—DC, literature review—LR, security overview—SO, bibliometric literature review—BLR, systematic literature review—SLR.

ReferenceYearReview TypeDCApplication TypesIoT and WSN Architecture UsedChallenges and IssuesR. Q.
[ ]2015LRIndustry802.11 (WiFi) technology in smart citiesWSN××
[ ]2020LRScienceIoT sensing applications discussed using sensing technologyWSN using RFIDEnergy harvesting, communication interference, fault tolerance, higher capacities to handling data processing, cost feasibility.×
[ ]2016SOIndustryIoT application in smart gridsIoTChallenges discussed along with solutions to cope with×
[ ]2017SOIndustryDeployment techniques discussed using sensor networkWSNCommunication cost, coverage time, accuracy, etc.×
[ ]2016LRWSN applications in urban areasUrban areasWSNProblems and solution of each WSN application×
[ ]2014SOIndustryNetwork security protocols discussed in industrial applicationsWSNChallenges of stack protocol and their solutions×
[ ]2020SLRSmart factoriesScope and conceptualization of IoT in Industry 4.0IoT×
[ ]2020LRSmart IoT devicesDetailed survey on security threat models applicable for IoT and WSN. They also discussed communication attacks and taxonomy of IoT and WSNBoth×
[ ]2019LRDiscussed technical and social perspective of IoT for future technology enhancementIoT×
[ ]2017SLRSmart citiesApplications, security, and taxonomy in IoTIoT××
[ ]2019LRIndustrialApplications and usage of actuators and sensor networks using MAC protocol.IWSNSecurity challenges on different layers of the stack, also discussed their solutions×
[ ]2016LRTechnologies, innovations, and applications of IoT discussed.IoT×
[ ]2014LRIndustrialCoverage areas of WSN are discussedWSNChallenges they face were: Node type, depth type, communication range, etc.×
[ ]2016SURIndustrialApplications of intrusion detection system in IoTIoT××
[ ]2015SURIndustrialOnly explore and analyze existing solution to detect sinkhole attackWSN××
[ ]2020LR×BothDiscuss attacks in IoT ans WSN with their solutions, advantages, and limitation×
[ ]2021SLRSmart mobilesRouting attacks and security measures in mobile network are discussedWSN××
[ ]2021LRIndustrialDetection of wormhole in both domainsBoth×
[ ]2017SURIoT systemsSoftware board and chips, crypto algorithms, security of IoT systems, and network protocols are discussedIoT×
[ ]2015SURExisting security approaches of IoT system are describedIoT×
[ ]2016SURDeployment models for sensor network to achieve coverage, their classification and working was discussedWSN××
[ ]2018BLRSmart factory & IndustryDiscuss 12 approaches of Industry 4.0. in business and account management fieldsIoT××
This Paper2021SLRSmart industry and FactoryApplications and contribution of both IoT and WSN are discussed in detailIoT and WSN (both)Key challenges and open issues of both IoT and WSN in Industry 4.0 are discussed

Research questions.

Research Questions (RQ)
RQ1What are the contributions of WSN in IR 4.0?
RQ2What are the contributions of IoT in IR 4.0?
RQ3What are the types of WSN coverage areas for IR 4.0?
RQ4What are the major types of network intruders in WSN and IoT systems?
RQ5What are the prominent network security attacks in WSN and IoT?
RQ6What are the major issues in IoT and WSN frameworks?
RQ7What are the limitations and research gaps in the existing work?

2. Related Studies

In this section, we analyze the state-of-the-art research studies on IoT and WSN. With the fourth industrial revolution, it is observed that communication, computation, and storage costs have remarkably decreased, which make integration of IoT and WSN possible and cost-effective globally. We studied many review articles and original research. Existing review articles lack, in many aspects, research challenges, issues, limitations, and future directions of IoT and WSN, but the systematic literature review (SLR) given in this work is precise enough to deal with the aspects of IoT and WSN area. Related work of review papers is provided next. Moreover, Table 2 is presented which shows the comparison between the proposed research work and the existing state-of-the-art analysis.

The authors in [ 1 ] discussed the very novel technology “WiFi”. They discussed how this technology helps IoT devices–used in various applications, such as smart cities, healthcare systems, and smart houses—communicate effectively. Landaluce et al. [ 4 ] discussed RFID and WSN technology in detail. They discussed how RFIDs are used to trace devices while WSN gathers information about them from interconnected devices. The authors also discussed the obstacles and challenges, such as energy consumption, fault-tolerant, communication interference, and cost feasibility, along with detailed surveys. They provided the advantages and limitations of wearable sensor devices. Energy consumption is increasing each day. Therefore, Dailipi [ 4 ] explored how IoT evolution has managed the electricity consumption process and provided many benefits to grid stations, consumers, and suppliers. They also discussed the security issues and challenges after introducing IoT devices in smart grids.

In [ 6 ], the authors discussed how WSN advancement had played a significant role in UASN. They traced the location of sensor nodes deployed underwater in the ocean using localization algorithms. They reviewed many applications of UASN, their advantages and their disadvantages. They also discussed the challenges they faced during deployment and presented future directions in the acoustic area. In [ 10 ], researchers discussed the applications and advantages of WSN being deployed everywhere due to their flexible and dynamic nature. They discussed each application of WSN in urban areas and their solutions. They analyzed how WSN deployment in urban areas demanded much more care and attention due to harsh weather and perverse channel conditions.

WSN is applicable in many domains, such as industrial automation, and the requirement elicitation of the industrial process is different from general WSN requirement gatherings. In [ 17 ], the authors presented some standard protocols that were used to measure the requirements of industrial applications. They also provide solutions to WSN protocols by discussing MAC, routing, and transport in detail. They also discussed the security issues in detail and identified the unsolved challenges encountered during designing standard protocols. In [ 19 ], the authors conducted SLR, which is mainly focused on scope definition, concept, literature review, analysis, synthesis, and future research directions. Their selected study has contributed to eight thematic perspectives: intelligence factories, CPS, data handling, IT infrastructure, digital transformation, HCI, IoT, and cloud [ 18 ].

Due to the rapid evolution in IoT and WSN, technology is becoming more vulnerable to security threats [ 42 , 43 , 44 ]. Therefore authors in [ 27 ] presented threat models for the security of WSN and IoT devices communication. In [ 28 ], the authors discussed IoT applications, advantages, challenges, and security issues from both technological and social perspectives. Researchers have provided detailed architectures of IoT and WSN and discussions of IDS system protocols. They also discussed the security challenges and attacks on IoT and WSN communication devices. Moreover, in [ 29 ], the authors conducted extensive research related to smart homes, applications, and IoT. They collected 229 articles, analyzed them thoroughly, and divided them into four categories. They discussed smart home IoT applications in the first category. The second category concerned with IoT applications in smart home technology. In the third category, they developed a framework to operate further. In the fourth category, they developed smart IoT home applications.

IoT has dramatically changed human life, especially regarding communication devices integrating technologies. Traditional industry is changing in the digital industry, and WSN and wireless sensor and actuator networks (WSANs) are the core parts of Industry 4.0. In the article [ 30 ], the authors discussed the industrial wireless sensor network (IWSN) and industrial wireless sensor and actuator network (IWSAN) in detail. They discussed IWSAN requirements, applications, challenges, solutions, and future directions in detail. IWSN/IWSAN are compelling technologies due to their promising benefits, such as low-cost deployment, less complexity, and mobility support.

In [ 31 ], the authors discussed how IoT plays a vital role in bringing the physical world close to the digital world. They discussed technologies, various challenges, future directions, and various Internet of Things (IoT) applications.

In [ 32 ], Sharma et al. have described the sensor nodes according to coverage point of view. They analyzed the full coverage issues by considering node type, deployment type, communication and sensing range, and positioning-based independent algorithms. They also discussed the research challenges of WSN.

Andrey et al. [ 33 ] described a detailed survey on IDS systems and presented the methods proposed for IoT. Using a cross-platform distributed approach, they analyzed the IDS system, their platform differences, and current research trends in IDS. In [ 34 ], the authors analyzed and discussed the solutions to identify and detect sinkhole attacks in the WSN domain. They discussed the advantages and limitations of the proposed solution as well. In [ 35 ], the authors presented a detailed review on security attacks of WSN and IoT along with their preventive measures, mitigations, and detection mechanisms. They stated that the integration of IoT and WSN has raised new challenges and open security issues. Although technology has increased, it has become prone to external attacks.

In [ 36 ], the authors presented a review on the security of mobile networks. They discussed the integration of WSN with IoT via the Internet and how the inter-connected devices have guarded networks against external attacks, keeping the router in a secure and protected environment. They discussed the attacks and their detection mechanisms over the Internet. Similarly, the authors in [ 37 ] have discussed the wormhole attack and its solution in IoT and WSN domains. They stated that the detection algorithm performed much better for IoT (70%) than WSN (20%). In [ 45 ], the authors discussed side-channel attacks in smartphones. Similarly, the authors in [ 38 ] discussed the security threats, challenges, and solutions in the IoT domain. While in [ 39 ], the authors analyzed existing protocols for secure communication between IoT devices. They also discussed open issues and challenges raised during the communication of IoT devices and future directions in IoT. The authors in [ 40 ] presented a detailed review regarding deployment schemes, classification, working, and comparative analyses of sensor nodes. This growing technology trend has converged the “world sense” from traditional systems to CPS—this transition is called Industry 4.0. The authors in [ 41 ] conducted a bibliometric review of 12 different approaches of critical aspects of Industry 4.0.

From the above-detailed literature review, we noticed that authors and researchers have worked on IoT and WSN, but the integration of both IoT & WSN with Industry 4.0 is benign. They discussed their applications, security attacks, advantages, and limitations at each level.

The proposed paper is more oriented towards the applications and contributions of IoT and WSN in Industry 4.0, along with the security attacks, their challenges, and open issues in each domain. This paper also provides the limitations and future directions for IoT and WSN in Industry 4.0.

3. Research Methodology

The SLR followed in this work is based on the template of IEEE SLR; all research steps and guidelines were followed using the same template. The research process and results were manually evaluated by comparing different research methods and techniques presented by different authors based on efficiency, security, limitations, and performance. First, we formulated our research questions based on the reviewed articles and then searched for these keywords in various databases. Using avoidance and consideration criteria, only relevant papers were considered. Then, we evaluated the quality of the papers, and then extracted the relevant features.

3.1. Planning Review

The planning of the review was based on the research questions and their objectives. Analyzes of IoT and WSN were conducted to show their importance in daily life. The use of smart and appropriate devices has been studied in this field but still needs critical analysis. Therefore, it is important to make a systematic review article in this realm, especially related to IoT and WSN, to show future directions. Therefore, we established the search technique, search strings, inclusion/exclusion criteria, and quality assessment criteria for the papers collected from different repositories. Figure 4 shows the step of our proposed review planning process.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g004.jpg

Planning process of systematic literature review (SLR).

3.2. Research Goals

The main objective of this study is to find out the major contributions, solved problems, and challenges of IoT and WSN in Industry 4.0. In addition, the research gap and limitations of current work in these areas helped us find room for improvement; we also explored future directions and possible outcomes in this area. We designed questionnaires on these domains to find high quality research papers. Some of them are listed in Table 3 . In addition, we answer the research questions in Table 3 and in Section 4 .

3.3. Selection of Primary Studies

It was a challenge to search the specific and limited computer science/engineering databases to get a “complete picture” of the research questions. After formulating the research questions, we collected research papers from various repositories, such as IEEE Xplore, ACM, Wiley Online Search, Elsevier, etc. The papers from electronic databases with the areas of IoT, WSN, and Industry 4.0 were efficiently evaluated. Figure 5 shows the names of the repositories where the research articles were collected from 2014 to June 2021.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g005.jpg

Repositories versus number of studies Used.

3.4. Selection/Search Criteria

This SLR combines three domains: IoT, WSN, and Industrial Revolution 4.0, so the search strings were related to each domain and its applications in Industry 4.0. Table 4 shows the subject search strings used to search for relevant articles. The search strings were divided into five groups to search for relevant articles from reputable journals and conferences.

Search strings.

Sr. No.GroupsGroup Search Query
1Group 1Application of WSN in IR 4.0.
2Group 2Implementation of IoT infrastructure in IR 4.0.
3Group 3Industrial Revolution 4.0. for smart manufacturing
4Group 4Security attacks, issues, and challenges of IoT and WSN in IR 4.0.
5Group 5Role of WSN and IoT systems in IR 4.0.

3.5. Inclusion and Exclusion Criteria

Several research articles were found on the mentioned domains, IoT, WSN and IR 4.0. To extract the most relevant and concise data from these articles, the following criteria were chosen, as shown in Table 5 . The publicly available papers written in English and related to the search strings and research objectives in IoT, WSN, and IR 4.0 published between 2014 and 2021 were considered for further SLR tracking.

Inclusion and exclusion criteria.

Inclusion Criteria
1Include only those papers written in the English language.
2Include papers that were published in 2014–2021.
3Include papers that reflected enough knowledge about the search strings and search objectives.
4Include papers whose titles, keywords, abstracts, and conclusions provided enough information related to WSN, IoT, and IR 4.0.
5Include papers whose content focused on WSN, IoT, and IR 4.0 content and provided in depth insights.
Exclusion Criteria
1Exclude papers written in a language other than the English language.
2Exclude gray papers.
3Exclude papers that were not published within 2014–2021.
4Exclude research papers containing less than three pages.
5Exclude papers that failed to meet the inclusion criteria.

3.6. Selection Results

As mentioned earlier, the downloaded articles were based on the initial screening processes, which were based on inclusion criteria. The articles were screened using the initial quality assessment criteria (QAC). The main objective of using the QAC was to ensure that the primary studies selected were appropriate to address the concerns of previous studies. Nearly 300 articles were found on the above topics. After applying a duplication filter, 40 articles were discarded, leaving 260 articles that were reviewed based on the above exclusion criteria. In the next step, 60 articles were excluded based on the inclusion/exclusion criteria. A quality analysis was performed for the remaining 200 articles. After the quality analysis, only 120 articles were reviewed. Figure 6 shows the year-by-year distribution of articles reviewed that were used for the SLR study. There is no doubt that the eliminated articles contained valuable material, but they were not studied because they did not meet the screening criteria. The number of articles was initially limited to 120, after which they were stored in the citation manager software for information synthesis.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g006.jpg

Year-wise distribution of articles.

The selected papers were evaluated against the quality assessment criteria (QAC) listed in Table 6 . Table 6 shows the quality assessment criteria (QAC) used to screen the articles for response grading. Studies selected for screening are described in Table 7 . Studies with a score greater than or equal to 80 were selected according to the grading criteria shown in Figure 7 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g007.jpg

Graded percentage of selected studies.

Selection criteria versus response graded.

CriteriaSelection CriteriaGraded Response
C1Is the aim of research and context clearly defined?1, 0.5, 0 (yes, nominally, no)
C2Is the context of research well addressed?1, 0.5, 0 (yes, nominally, no)
C3Are the findings clearly stated?1, 0.5, 0 (yes, nominally, no)
C4Based on the findings, how valuable is the research?>80% = 1, <20% = 0, in between = 0.5

Selected studies used for SLR analysis.

Sr. No.Title of ResearchAuthorsYear
1.Cyber-Physical Systems Security: Analysis, Challenges, and SolutionsY. Ashibani and Q. H. Mahmoud2017
2.A Review of IoT sensing applications and challenges using RFID and wireless sensor networksH. Landaluce, L. Arjona, A. Perallos, F. Falcone, I. Angulo, and F. Muralter2020
3.Enhancement of relay nodes communication approach in WSN-IoT for underground coal mineR. Sharma and S. Prakash2020
4.Applications of wireless sensor networks for urban areas: A surveyB. Rashid and M. H. Rehmani2016
5.An empirical study of application layer protocols for IoTU. Tandale, B. Momin, and D. P. Seetharam2017
6.Digital twin technologies and smart cities.M. Farsi, A. Daneshkhah, A. Hosseinian-Far, and H. Jahankhani2020
7.Internet of things (IoT) embedded future supply chains for Industry 4.0: An assessment from ERP-based fashion apparel and footwear industryM. A. A. Majeed and T. D. Rupasinghe2017
8.Towards Industry 4.0 utilizing data-mining techniques: a case study on quality improvementH. Oliff and Y. Liu2017
9.An industrial perspective on wireless sensor networks-a survey of requirements, protocols, and challengesA. A. Kumar S., K. Ovsthus, and L. M. Kristensen.2014
10.The smart factory as a key construct of Industry 4.0: A systematic literature reviewP. Osterrieder, L. Budde, and T. Friedli2020
11.Social expectations and market changes in the context of developing the Industry 4.0 conceptS. Saniuk, S. Grabowska, and B. Gajdzik2020
12.Key IoT StatisticsB. Jovanović2021
13.30 Internet of Things – IoT stats from reputable sources in 2021A. Multiple2021
14.Wide-area and short-range IoT devicesS. O’Dea2021
15.The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0M. Wollschlaeger and T. Sauter and J. Jasperneite2017
16.Internet of things (IoT): a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applicationsG. Misra, V. Kumar, A. Agarwal, and K. Agarwal2016
17.EDHRP: Energy-efficient event-driven hybrid routing protocol for densely deployed wireless sensor networksFaheem M, Abbas MZ, Tuna G, Gungor VC.2015
18.A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks.Tuna G, Gungor VC2017
19.Lrp: Link quality-aware queue-based spectral clustering routing protocol for underwater acoustic sensor networksFaheem M, Tuna G, Gungor VC2017
20.Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networksParra L, Sendra S, Lloret J, Rodrigues JJ.2017
21.WSN-and IoT-based smart homes and their extension to intelligent buildings. SensorsGhayvat H, Mukhopadhyay S, Gui X, Suryadevara N2015
22.Conceptual model for informing user with an innovative smart wearable device in Industry 4.0M. Periša, T. M. Kuljanić, I. Cvitić, and P. Kolarovszki2019
23.Evolution of wireless sensor network for air quality measurementsArroyo, P.; Lozano, J.; Suárez, J.2018
24.Industrial wireless sensor and actuator networks in Industry 4.0: Exploring requirements, protocols, and challenges—A MAC surveyS. Raza, M. Faheem, and M. Genes2019
25.Cause the Industry 4.0 in the automated industry to new requirements on the user interfaceC. Wittenberg2015
26.Impact of 5G technologies on Industry 4.0G. S. Rao and R. Prasad2018
27.Material efficiency in manufacturing: Swedish evidence on potential, barriers, and strategiesS. Shahbazi et al.2016
28.Organizational change, and industry 4.0 (id4). A perspective on possible future challenges for human resources managementJ. Radel2017
29.Organizational culture as an indication of readiness to implement Industry 4.0Z. Nafchi and M.Mohelská2020
30.Smart production planning and control: concept, use-cases, and sustainability implicationsO.E, Oluyisola2020
31.Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0.J. M. Müller et al.2018
32.Visual computing as a critical enabling technology for industries 4.0 and industrial InternetJ. Posada et al.2015
33.Digitalization and energy consumption. Does ICT reduce energy demandS. Lange2020
34.Industry 4.0: adoption challenges and benefits for SMEsT. Masood and P. Sonntag2020
35.Measurement and analysis of corporate operating vitality in the age of digital business modelsJ. Zhu et al.2020
36.Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacksM. Abomhara and G. M. Køien2015
37.Sharing user IoT devices in the cloudY. Benazzouz, C. Munilla O. Gunalp, M. Gallissot, and L. Gurgen2014
38.Security in Internet of things: Challenges, solutions, and future directionsS. A. Kumar, T. Vealey, and H. Srivastava2016
39.Survey of intrusion detection system towards an end-to-end secure internet of thingsA. A. Gendreau, M. Moorman2016
40.Recent advances and trends in predictive manufacturing systems in a big data environmentJ. Lee et al.2015
41.A comprehensive dependability model for QOM-aware industrial WSN when performing visual area coverage in occluded scenariosT. C. Jesus, P. Portugal, D. G. Costa, and F. Vasques2020
42.Security issues and challenges on wireless sensor networksM. A. Elsadig, A. Altigani, and M. A. A. Baraka2019
43.Challenges of Wireless Sensor Networks and Issues associated with Time SynchronizationG. S. Karthik and A. A. Kumar2015
44.Design and analysis of intrusion detection protocols for hierarchical wireless sensor networksM. Wazid2017
45.Intrusion detection protocols in wireless sensor networks integrated to the Internet of Things deployment: survey and future challengesS. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park2020
46.Robust malware detection for Internet of (battlefield) Things devices using deep Eigenspace learning [ ]Azmoodeh, A. Dehghantanha, and K.-K.-R. Choo2019
47.LSDAR: A lightweight structure-based data aggregation routing protocol with secure IoT integrated next-generation sensor networks.Haseeb K, Islam N, Saba T, Rehman A, Mehmood Z.2020
48.SEPTIC: Detecting injection attacks and vulnerabilities inside the DBMS.Medeiros, M. Beatriz, N. Neves, and M. Correia2019
49.An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers and Electrical EngineeringChalla S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, et al.2018
50.Internet of Things: vision, applications and challengesRishika Mehta, Jyoti Sahnib, Kavita Khannac2018
51.A roadmap for security challenges in the Internet of ThingsArabia Riahi Sfar, Enrico Natalizio, Yacine Challal, Zied Chtourou2018
52.A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust evaluationH. Chen, C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava2019
53.Analysis of quantities influencing the performance of time synchronization based on linear regression in low-cost WSND. Capriglione, D. Casinelli, and L. Ferrigno2016
54.C–Sync: Counter-based synchronization for duty-cycled wireless sensor networksK.-P. Ng, C. Tsimenidis, and W. L. Woo2017
55.Time synchronization in WSN with random bounded communication delays.Y.-P. Tian2017
56.A novel model of Sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend ItM. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh, and A. J. Meybodi2019
57.Challenges, threats, security issues, and new trends of underwater wireless sensor networksG. Yang, L. Dai, and Z. Wei2018
58.Industry 4.0 key research topics: A bibliometric reviewD. Trotta and P. Garengo2018
59.Privacy in the Internet of Things: threats and challengesJ. H. Ziegeldorf, O. G. Morchon, and K. Wehrl2015
60.On the security and privacy of the Internet of Things architectures and systems.E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras2015
61.Cybersecurity issues in wireless sensor networks: current challenges and solutionsD. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral-Cruz2020
62.A security model for IoT-based systemsZ. Safdar, S. Farid, M. Pasha, and K. Safdar2017
63.Security issues and challenges in IoT routing over wireless communicationG. Saibabu, A. Jain, and V. K. Sharma2020
64.Security and privacy consideration for Internet of Things in smart home environmentsDesai, Drushti, and Hardik Upadhyay2015
65.E.D. Security and grand privacy challenges for the Internet of ThingsFink, G.A., Zarzhitsky, D. V., Carroll, T.E., and Farquhar2015
66.A comprehensive approach to privacy in the cloud-based Internet of Things.Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., and Wehrle, K.2016
67.Towards an analysis of security issues, challenges, and open problems on the internet of Things.Hossain, A. J., Fotouhi, M., and Hasan, R.2015
68.An End-to-end view of IoT security and privacyZhen Ling, Kaizheng Liu, Yiling Xu, YierJin, XinwenFu2017
69.Security and privacy considerations for IoT application on smart grids: Survey and research challengesDalipi, F.; Yayilgan, S.Y.2016
70.Internet of Things security: A surveyAlaba, Fadele Ayotunde, et al.2017
71.Security for the Internet of things: a survey of existing protocols and open research issuesJ. Granjal, E. Monteiro, J. Silva2015
72.Security, privacy and trust in Internet of things: the road aheadS. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini2015
73.Access control and authentication in the Internet of Things environmentA.K. Ranjan, G. Somani2016
74.Toward secure and provable authentication for the Internet of Things: realizing Industry 4.0S. Garg, K. Kaur, G. Kaddoum, and K. K. R. Choo2020
75.Prediction of satellite shadowing in smart cities with application to IoTS. Hornillo-Mellado, R. Martín-Clemente, and V. Baena-Lecuyer2020
76.Software-defined industrial Internet of Things in the context of Industry 4.0J. Wan et al.2016
77.Residual energy-based cluster-head selection in WSN for IoT application.T. M. Behera, G. S. Mohapatra, U. C. Samal, M. G. S. Han, M. Daneshmand, and A. H. Gandomi2019
78.DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architecture,A. Rahman et al.2020
79.Application of IoT-aided simulation to manufacturing systems in the cyber-physical systemY. Tan, W. Yang, K. Yoshida, and S. Takakuwa2019
80.Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in Industry 4.0 [ ]Y. Wu, H.-N. Dai, and H. Wang2020
81.Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoringM. E. Haque, M. Asikuzzaman, I. U. Khan, I. H. Ra, M. S. Hossain, and S. B. Hussain Shah2020
82.Toward dynamic resources management for IoT-based manufacturingJ. Wan et al.2018
83.SENET: A novel architecture for IoT-based body sensor networksZ. Arabi Bulaghi, A. Habibi Zad Navin, M. Hosseinzadeh, and A. Rezaee2020
84.Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0M. Faheem et al.2019
85.IoT and wireless sensor network-based autonomous farming robotA. Khan, S. Aziz, M. Bashir, and M. U. Khan2020
86.Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environmentsC. T. Chen, C. C. Lee, and I. C. Lin2020
87.Wireless sensor network combined with cloud computing for air quality monitoringP. Arroyo, J. L. Herrero, J. I. Suárez, and J. Lozano2019
88.Edge computing-enabled wireless sensor networks for multiple data collection tasks in Smart AgricultureX. Li, L. Zhu, X. Chu, and H. Fu2020
89.Cluster centroid-based energy-efficient routing protocol for WSN-Assisted IoTN. Prophess, R. Kumar, and J. B. Gnanadhas2020
90.An energy-efficient and secure IoT-based WSN framework: an application to smart agricultureK. Haseeb, I. U. Din, A. Almogren, and N. Islam2020
91.Deployment schemes in a wireless sensor network to achieve blanket coverage in large-scale open areaVikrant Sharmaa, R.B. Patelb, H.S. Bhadauriaa, D. Prasadc2016

3.7. Data Extraction and Synthesis Process

After collecting articles relevant to the research questions and objectives, we performed a SLR according to various characteristics, such as year of publication, limitations, and future work. The information or previously collected characteristics were integrated with the responses collected through questionnaires to summarize the information.

After an extensive and systematic review of the literature, the research questions are answered and described in the following sections. The contributions and types of WSN and IoT are respectively explained in the Section 4.1 – Section 4.3 . Before attacks network intrusions are briefly classified in Section 4.4 . In contrast, network security attacks and WSN and IoT layer issues are discussed in Section 4.5 and Section 4.6 . In Section 4.7 , we discuss the limitations and future work of the selected papers. Finally, we conclude the paper in Section 7 .

In this section, we have briefly discuss the results of the SLR work. We have formulated the research questions presented in Table 3 and divided the results section into seven subsections to answer them. The information about the contribution of WSN and IoT in IR 4.0, network security attacks and intruders in WSN and IoT, WSN coverage, issues in IoT and WSN framework, and limitations of existing reviews are explained in this section. The challenges section summarizes all the problems encountered in WSN and IoT usage.

4.1. RQ1: Contributions of WSN in IR 4.0

The use of WSN has attracted a lot of attention in industry. Because of their prevalence and use in industry, WSN have given rise to IWSN and IWSAN, respectively. These networks enable autonomous work without human intervention. The in-network transmission characteristics are fundamental properties of WSN. Sensor nodes do not transmit raw data, but integrate it to save communication costs. Due to their unique properties and wide range of applications, they are used in many systems, such as military, surveillance, home automation, smart cities, smart buildings, and healthcare monitoring [ 27 ]. WSN- and IoT-based devices are used to create reliable, realistic, efficient, flexible, and economical smart cities and buildings in heterogeneous environments [ 48 ].

The categories discussed in this paper and the contribution of WSN in IR 4.0 are listed in the form of a taxonomy presented in Figure 8 . WSN is also used in health care management systems to monitor medically ill patients, periodically check their various measurements such as blood glucose levels and pulse, and wirelessly transmit this information to a central repository for further diagnosis [ 49 ]. WSN is also used to assist elderly and disabled people. Disabled people are informed of relevant information about real-time activities using smart devices, such as wristwatches [ 28 , 50 ]. In recent decades, WSN have been applied in many fields, including transportation, agriculture [ 51 ], automation, manufacturing process control, and supply chain management. In addition, WSN can be easily deployed, have low construction cost, no expenditure on wiring, and lower complexity [ 52 , 53 ].

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g008.jpg

Taxonomy of existing studies.

WSN can be used in various manufacturing applications, such as industrial control, process automation, rescue, and defense. WSN is also used to control and automate industrial processes known as actuators. They can operate independently of a physical environment defined by predefined dimensions [ 54 ]. WSN is used to collect, track, and record data in smart factories. Data acquisition is usually done by product information in smart factories. After data collection, processing is done by intelligent machines and manufacturing systems. Nowadays, these factories are self-sufficient, cost-effective, and automated by integrating wireless communications with existing private networks and reducing labor [ 30 ].

In software, WSN takes maximum advantage of wireless technologies used to build industrial network infrastructure [ 55 ]. On the other side, Industry 4.0 is integrating big data analytics and cloud services [ 56 ], 3D printing, computer security, autonomous robotics, the Internet of Things (IoT), 5G, Augmented Reality (AR), and modeling [ 57 , 58 ].

4.2. RQ2: Contributions of IoT in IR 4.0

An integrated digital system would introduce a new intelligent and economical manufacturing process using cutting-edge technology for a variety of existing items and processes [ 59 ]. The data collected from production process warehouses and consumer information can be critically analyzed to make a decision in real time under Industry 4.0. The real-time decision-making capability of each small and medium organization enables them to efficiently accept new technologies [ 60 , 61 ]. Industrial IoT delivers solutions and services that provide insights into an organization’s ability to monitor and control its operations and assets. IIoT software and tools provide important solutions for better process, layout scheduling, organization, and administration.

In addition, IIoT enables real-time and decision-making features among numerous networked devices that can communicate and interact with each other [ 62 ]. Because of the rapid communication and data transfer, attackers can attack data and cause harm to an organization, resulting in cyber attacks. Cyber attacks have become a major challenge for the industrial Internet of Things (IIoT). Therefore, integrating IoT with Industry 4.0 plays a critical role in securing IoT devices from attacks. Unique security objectives and challenges of IIoT have been introduced to overcome industrial-level issues. IIoT challenges and objectives relate to IoT being used by consumers and its capabilities leading to longer life of IoT devices and sensor nodes. In [ 63 ], the authors analyzed security challenges and attacks at three levels of the network (perception, network, and application). They considered cryptographic challenges, authentication, network monitoring, and access control mechanisms. The IIoT also addresses local network connectivity and protection from attackers inside. Cyber attacks have become a serious challenge for the IIoT. Hackers attack infrastructure/devices through intrusion and hiding, resulting in poor performance. A bidirectional long and short term memory network with a multi-feature layer has been developed to avoid temporal attacks. Machine learning-based networks that learn temporal attacks from historical data and make associations with test data can effectively identify and detect different attacks within different intervals [ 64 ].

DL-IIoT has enormous potential to improve data processing and contribute to IR 4.0. Similarly, machine learning algorithms, such as logistic regression, are widely used for malware detection and security threat protection [ 65 ]. Deep learning algorithms are also used for intelligent analysis and processing. Deep learning [ 46 ] algorithms such as CNN, auto-encoders, and recurrent neural networks have applications such as intelligent assembly and manufacturing, network monitoring, and accident prevention. The application of deep learning algorithms in IIoT has also enabled various smart applications such as manufacturing, active attack detection and prevention systems, smart meters, and smart agriculture [ 66 ]. DL-IIoT relies heavily on data collection, which affects the privacy of the organization’s data. Therefore, differentiated privacy is used to protect user privacy, reduce privacy risk, and achieve high performance in IIoT.

On the other hand, IoT and IIoT must provide “differentiated privacy” for individuals and industrial data [ 67 , 68 , 69 ]. The contribution of IoT in Industry 4.0 has improved the average availability and sustainability of the enterprise by knowing market trends and decreasing unanticipated downturns [ 70 ]. The taxonomy of existing studies and the contribution of IoT in IR 4.0 is shown in Figure 8 .

4.3. RQ3: Type of WSN Coverage Area for IR 4.0

WSN coverage is an important factor in sensor quality. Sensing and connectivity are key features of WSN. The former indicate how well a particular sensor behaves and monitors a particular area of interest in which it is deployed. Connectivity shows how well different nodes communicate with each other. The types of wireless sensor network coverage are as follows.

4.3.1. Area Coverage

Sensors usually perform well in area coverage and monitors the field of interest (FoI). This is also called “blanket coverage” because each node communicates with others. Each sensor is placed so that the coverage of the other WSN sensors covers each other [ 32 ].

4.3.2. Barrier Coverage

Barrier coverage of the sensor network comes into play when some intruders try to breach the security layer of the network. Sensors are easy to handle and deploy; therefore, their wireless nature makes them vulnerable to malicious security attacks [ 71 ]. The sensor nodes are primarily distributed throughout the network and are deployed in chains to detect interruptions.

4.3.3. Point Coverage

Point coverage aims to find a target within range using nearby nodes. It is also known as target coverage. It is characterized by consuming less energy in a given zone than in the entire region of the FoI. Only a few targets are covered by individual nodes, while other targets can be detected under other sensor scopes. The primary goal is to select a specific target within the FoI to reduce energy consumption [ 71 ].

4.4. RQ4: Classification of Network Intruders

There are two main types of intruders: internal and external. Internal intruders are people inside the organization; they can be either a customer or a legitimate user, such as an employee of the organization’s network. External intruders are people outside the organization, whether external or internal. Each intruder can be involved in numerous illegal activities, working alone, as a group, or with agencies. These entities are described in detail below.

4.4.1. Solo Entities

Solo entities are those that work alone with minimal safety. They are usually experts in their domains by employing a single piece of code as equipment, such as viruses, worms, and sniffers to misuse frameworks. They usually gain access to the organization’s framework through hardware damage and web loopholes. Their targets are usually little, and attacks are slightly less critical. Moreover, large and complex systems that may contain flaws are more vulnerable to attacks. Monetary institutions are also more exposed to attacks as they exchange sensitive information [ 72 ].

4.4.2. Organized Groups

Solo entities are those who work alone with minimal security. They are usually experts in their field, using a single piece of code as equipment, such as viruses, worms, and sniffers to abuse frameworks. They generally gain access to the organization’s framework through hardware damage and web loopholes. Their targets are usually small, and attacks are somewhat less critical. In addition, large and complex systems that may contain flaws are more vulnerable to attack. Monetary institutions are also more exposed to attacks because they exchange sensitive information [ 72 ].

4.4.3. Intelligence Agencies

Intelligent agencies from other countries are involved in this type of attack. These agencies constantly seek to test the military architecture of other nations, including contemporary monitoring and covert political and military activities. To do so, they require many resources, from software to hardware, research, development, personnel, and finances. Because they have all these resources at their disposal, some agencies now pose a serious threat to economic and military espionage. Such organizations pose the greatest threat to networks and must be closely monitored to protect the nation’s important assets [ 73 ].

4.5. RQ5: Network Security Attack in IoT and WSN Layers

Threats become more attractive and dangerous as technology increases. Although new security mechanisms are being developed, intruders can easily find other ways to attack systems. Table 8 explains the network security attacks in the IoT and WSN domains. The attacks are categorized according to the open system interconnection (OSI) layered point of view [ 74 ].

Network Security Attacks on IoT and WSN Layers.

Sr. No.Layer NameAttacks
1Physical layerInterception, radio interference, jamming, tempering, Sybil attack.
2Data link layerReplay attack, Spoofing, altering routing attack, Sybil Attack, collision, traffic analysis, and monitoring, exhaustion.
3Network layerBlack hole attack, wormhole attack, sinkhole attack, grey hole attack, selective forwarding attack, hello flood attack, misdirection attack, internet smurf attack, spoofing attack.
4Transport layerDe-synchronization, transport layer flooding attack.
5Application layerSpoofing, alter routing attack, false data ejection, path-based DoS.

4.5.1. Denial of Service Attacks (DOS)

A Denial-of-service (DoS) attack is a malicious attack in which attackers make the victim’s system unresponsive and difficult to reach for the legitimate user by making many requests to the expected URL than the server can handle [ 75 , 76 ]. DoS attacks typically occur when authenticated clients have not been granted access to the information or service [ 77 ]. A distributed denial of service (DDoS) attack is a type of DoS attack that uses multiple users or infected systems to attack a victim’s system or to attack a website so that it becomes unresponsive. This attack also prevents the website from functioning properly and disrupts regular traffic. In WSN, a DDoS attack changes the routing protocol information DSR, resulting in a huge amount of unauthorized traffic and making the network/website unavailable. On the other hand, a low-rate denial-of-service (LDoS) attack is another type of DoS that penetrates the WSN’s routing protocol, thus compromising the security and trust mechanisms. An LDoS attack is difficult to detect due to its non-stationary nature and low signal strength52. In this attack, illegitimate traffic affects the operational capability of a network. It causes severe outages and monetary losses.

4.5.2. Replay Attacks

When an attacker replays a flood of messages between the sender and the receiver, updating the line table (DT) to steal information, it is called a replay attack [ 33 ]. It is a network layer attack in which a third party intercepts the data during transmission. The attacker retransmits this data by either modifying or delaying it, spoofing the sender’s IP address to the attacker’s IP address, and impersonating the legitimate sender.

4.5.3. Trojan Worms, Viruses, and Malware

An attacker can use malicious software to manipulate data, steal information, or even launch a denial-of-service attack on a device. A worm, such as a Trojan horse, can infect one’s computer when one downloads a file or receives an update. The worm then multiplies and attacks other machines on the network. Unlike a virus, many Trojan horses usually reside on one’s own computer. A virus can infect the host’s file when sent via email and then spread to other users [ 78 ]. Malware is malicious content that can interfere with a computer’s operation and slow its performance. When data from IoT devices is compromised, malware can infest the cloud or data centers. These attacks breach the primary security mechanisms of any OS/server, such as a firewall and window defender.

4.5.4. Black Hole Attacks

This is a network layer attack known as a packet drop attack. In this attack, a node sends an RREQ packet to all its neighbors in the network, and the router is supposed to forward the packet instead of discarding it. The nature of this attack is similar to a DDoS attack. Attackers are used to attack routers by sending many false requests to prevent legitimate routers from forwarding packets. This is also called a first-come, first-served attack because the attacker can also use a malicious router or reprogram it to block packets instead of sending correct information [ 78 ]. These attacks reduce the average throughput. When combined with a sinkhole attack, this attack affects performance and stops all traffic around the black hole. When combined with the sinkhole attack, this attack severely degrades traffic and modifies or discards content during transmission.

4.5.5. Sink Hole Attacks

This is a network layer attack where attackers attract all network traffic from nearby nodes to a compromised node and appear as attractive and trusted nodes. This attack is also used to initiate other attacks such as spoofing attacks, DoS, and modification of routing information in WSN [ 34 ]. When combined with selective routing and worm attacks, sinkhole attacks become even more dangerous. A sinkhole attack is initiated in two ways, either by hacking a node within the network or by a malicious node impersonating itself as the shortest path to the base station [ 35 , 36 ]. A sinkhole attack impacts the routing configuration/protocols of the forwarding node. Due to this behavior, it is considered as an error or malicious node by the neighboring nodes, which affects the network performance. This leads to mis-routing and incorrect displays of the routing protocol.

4.5.6. Wormhole Attacks

A wormhole attack is a network layer attack in which an invader attacks the WSN through two or more compromised nodes. The invaders forward the data from one malicious node to another node at the end of the network through the tunnel. The wormhole appears to other nodes as a fictitious neighbor. Wormhole nodes usually transmit data directly from one node to the destination without including other nodes in the path. Due to this nature, other nodes in WSN easily trust those closest to other nodes, which causes many routing problems. Moreover, they can build better communication channels for long-range communication [ 37 ]. Wormhole attacks affect the performance of many network services, such as time synchronization, localization, and data fusion.

4.5.7. Selective Forwarding (Gray Hole)

A selective forwarding attack (SFA) is a special type of black hole attack in which the compromised node drops some selective packets instead of all packets. Invaders drop packets containing critical information, such as military information, without noticing them or allowing others that may contain non-critical information to pass. This can lead to worse effects and a decrease in network efficiency [ 34 , 35 , 36 , 37 ]. Selective forwarding attacks impact network performance and consume limited energy resources.

4.6. RQ6: Issues in WSN and IoT Frameworks

In this section, we mention various WSN and IoT frameworks that highlight the importance of WSN and IoT in different aspects of life. Although many advances have been made in IoT, there are still many problems, as shown in Figure 9 , that need to be reduced and solved efficiently to avoid any damage [ 79 , 80 ].

An external file that holds a picture, illustration, etc.
Object name is sensors-22-02087-g009.jpg

Issues in WSN and IoT Framework.

4.6.1. Security

Security is essential for any organization to protect its environment, systems, devices and applications from outside attacks. Data and communication technologies are increasing every day. Therefore, data and information security are necessary tasks [ 81 ]. In addition to data, its transmission over the network should also be protected. Although technology has evolved and security mechanisms have improved, attackers have still found many ways to breach the security level [ 38 , 39 ]. With the increasing number of IoT devices, new security issues have emerged. For real-time applications, the most important thing is to keep the WSN secure. The network and its associated router or hub should enforce an access control mechanism to prevent unauthorized users. Each node connected to another node is security relevant, whether it is a restricted device or a smart device. Acceptance, confirmation, categorization, trust, and information security are the most important security requirements to be considered in IoT networks and WSN. It is challenging to provide security measures for flexible detection devices. Therefore, protecting information from dictatorial forces or illegal access is called security [ 82 , 83 ].

4.6.2. Data Confidentiality and Privacy

Data confidentiality is a significant issue in IoT and network security. In IoT frameworks, the client gains access to the information and system management in an unintended environment due to issues such as the use of sensor nodes. Attackers can physically capture them and extract data using an energy analysis attack [ 84 ]. Refurbished devices made from these captured devices can launch new attacks and violate security. Therefore, the IoT device should verify whether or not the user or device has been granted permission to access the system. The practice of controlling access to data by granting or denying permission based on a set of laws. Many devices/clients must be authenticated by management to access the system. Data confidentiality and access are the main issues in the Internet of Things (IoT). Researchers are trying to figure out how to handle the personalities of customers, items/articles, and devices in a secure manner. Due to the ubiquitous nature of IoT and WSN systems, privacy and confidentiality are major concerns in IoT devices and frameworks. Some issues, such as sniffing and spoofing, unauthorized access, data changing, forging, and unapproved alteration of IoT and WSN nodes, pose significant uncertainties in IoT. An attacker can use various IoT devices and applications to capture sensitive and personal data that is visible to outsiders.

4.6.3. Data Acquisition and Transmission

The primary goal of IoT is to collect data and transmit it to where it is needed in a network. Sensors are the devices used to collect data from the environment to transmit it to the base station. After the raw data is collected, it is sent to the Sink Hub for processing. Data collection and transmission are other problems in IoT and WSN because data is exposed and modified during transmission. Data acquisition is an energy-consuming process, so extra care must be taken during gathering and transmission. Intruders can steal the data during transmission if it is not encrypted or transmitted over a secure channel. The intruder can take over a node and reprogram it with a malicious code, damaging the entire network. Therefore, security is required for this process. Sometimes intruders attack the databases of organizations to violate the confidentiality of the data [ 85 ]. Also, the intruder may destroy the node or collect important or unusual information that could be used against the system. For this reason, researchers present many security mechanisms. They protect end-to-end communication links using one-time-pad (OTP) encryption method and also identify the vulnerabilities in the DBMS application using SEPTIC method.

4.6.4. Resource Limitations

If necessary resources in WSN and IoT are abandoned or not handled efficiently, it may affect the performance of the network. The network consists of many nodes and sensors that require energy to operate well [ 86 ]. Various MAC layer protocols have been developed to reduce the energy consumption of sensors or nodes. These energy-efficient algorithms work primarily by regulating the synchronization of network traffic over time and the time period during which a node becomes active in a network [ 87 , 88 ]. In contrast, the communication medium is another basic requirement, since nodes rely on the Internet for data transmission. There is a constant need for energy, otherwise the network will fail. The nodes have limited resources because battery capacity, correspondence capacity, and computing power are low. Again, security is the main problem, because the security measurement expenses require more resources to maintain the speed of the network, which is not affordable. As a result of low regulated security, attacks can subvert software execution and protocols used in the network [ 89 , 90 ].

4.6.5. Quality of Service

Quality of Service (QoS) manages networks and resources to strengthen IoT connectivity. QoS manages delay, jitter, reliability, and bandwidth by classifying network traffic. It plays an important role in optimizing systems. Quality of Service means that energy efficiency, reliability, bit error rate, and latency should be good enough to capture data over a network. Therefore, it is classified in two ways: program-specific and network-specific. The QoS perspective of the network refers to the effective management of network resources and transmission performance, while the perspective of the program refers to mobility, time synchronization, and sampling parameters. Similarly, many algorithms have been developed to distribute heavy traffic evenly, and the energy consumption load in a network uses a cluster-head approach to achieve high performance and efficiency [ 91 ].

4.6.6. Tampering

Sensors can be placed either indoors or outdoors. Indoor sensors can be easily managed and protected, while outdoor sensors are more vulnerable to attackers due to remote locations with poor security, harsh climates, etc 78. The probability that these sensors will be physically attacked is much higher; therefore, physical protection cannot be guaranteed. A DoS attack manipulates the network by breaking the connection or changing the current network. The attacker can also replace the original node with a fake or malicious node, causing a severe attack on the network [ 92 ]. In a Sybil attack, a malicious node penetrates each cluster head of the network and affects the operation of the routing protocol. Compromised nodes can be used to launch new attacks without exposing themselves [ 41 , 93 ]. These nodes are difficult to detect and isolate, allowing an attacker to alter data or transmit malware throughout the network that causes significant damage [ 94 ]. Constant monitoring of the network is necessary to ensure that WSN nodes cannot be tampered with and that network performance remains stable [ 95 ].

4.6.7. Authorization and Authentication

Nodes are the building blocks of the Internet of Things that must be defined in the network. Transmission between devices and access to the entire network span a wide range in IoT and WSN. IoT devices perform role-based access control, and their devices are allowed to do only what is required [ 96 , 97 ]. Devices and their data must be protected from physical and logical attacks on the network. Attacks on the DNS cache could affect the overall performance of the network. Authentication is the process by which each node on the network can access data based on a fixed connection to a server or cloud-based server. If the authentication process is not administered properly, it will lead to security issues and questions. An attacker can easily access the network and make it fail temporarily by making too many wrong attempts.

Authentication is complicated due to the massive proliferation of wireless media and the nature of sensor networks. Authentication is usually done using the credentials of a legitimate user [ 98 , 99 ]. However, this technique is not secure enough. Therefore, passwords should be changed regularly and computers should not be left unattended to make this technique robust. Both the sender and the recipient should perform authentication to verify the origin of the communication [ 100 , 101 ].

4.7. RQ7: Limitations of the Literature Review

In this section, Table 9 explains the proposed solutions of the work conducted by various authors and the contributions with the limitations of their work are also described. The goal was to find research gaps in this area to help other researchers. The research gaps will allow researchers to develop solutions and new methods that could help fill the missing piece.

Contributions and limitation of the literature.

ReferenceTitle of ArticleProposed SolutionLimitations and Future Work
Sharma et al. [ ]Enhancement of relay nodes communication approach in WSN-IoT for underground coal mineThey designed relay node structures for a wireless sensor network and load balancing to improve network lifetime parameters. They designed an IoT-based WSN to provide advance warning of any natural disaster in coal mines.There were several analysis parameters to analyze the networks, such as network lifetime, communication and transmission cost, energy consumption, and coverage of the whole area.
Faheem et al. [ ]Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0They designed a comprehensive, optimized, and QoS monitoring multi-hop network system for real-time data transmission in Industry 4.0. This self-optimized smart routing protocol (SIRP) was efficiently used for WSN-based SG applications.In the future, they will attempt to enhance their developed SIRP routing scheme and communications architecture to collect QoS-aware data for different WSN-based smart grid applications with little data redundancy.
Arslan et al. [ ]IoT and wireless sensor network-based autonomous farming robotThey developed a computer vision-based algorithm used for the classification of weed and a non-image. Wireless sensor nodes detect weed images through image processing methods and gather light, temperature, humidity, and moisture data.The limitation of this work is that they did not provide any GUI or mobile application control to work robot autonomously.
Chen et al. [ ]Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environmentsThey proposed a practical and secure approach to merge IoT and WSN. Their scheme had high performance, low communication, and computational costs, low energy consumption, and provided effective authentication of the user in IoT.The limitation of this study is that they did not provide a solution to the security threats in a heterogeneous IoT environment. In the future, they will evaluate the reliability and scalability of their systems of heterogeneous environments.
Rathee et al. [ ]A secure IoT sensors communication in Industry 4.0 using blockchain technologyWireless sensor network security improved using blockchain and compared security metrics. &It ensured confidentiality and responsibility and tracked each sensor’s operation. The blockchain was used to store IoT artifacts and sensors.The developed IoT sensor takes time to test a single block before it is put to the blockchain.
Mellado et al. [ ]Prediction of satellite shadowing in smart cities with application to IoTThe technology had a minimal processing load. It was highly desirable to create a coverage map that can optimize network resources in satellites.There is a lack of evaluation of requirements for satellite-based IoT and output connectivity protocols through simulations in actual situations.
Garg et al. [ ]Towards secure and provable authentication for the internet of things: realizing Industry 4.0The effectiveness of the developed protocol was evaluated with frequently utilized AVISPA, PUFs, and ECC encryption algorithms. A proposed technique was developed to create a durable, stable, and efficient user architecture that promotes shared authentication for IoT and server nodes and is resistant to cyber threats.This protocol is for academic and research purposes only, and its implementation has not yet been tested in the real world.
Behera et al. [ ]Residual energy-based cluster-head selection in WSN for IoT applicationThe method takes into account the intended value of initial energy, residual energy, and cluster heads to choose the specific set of cluster heads in the network that adapts IoT applications to maximize flow, durability, and residual energy.They did not review existing path selection factors in a node mobility network that altered its role constantly.
Wan  et al.  [ ]Software-defined industrial Internet of Things in the context of industry 4.0They proposed a new idea of information interaction in Industry 4.0 using software-defined IIoT. They enhanced the network size using IIoT. The IIoT architecture manages physical devices and information exchange methods via a customized networking protocol.The limitation of the study is the effective coordination between IIoT where the network is heterogeneous for transmission of information.
Tan et al. [ ]Application of IoT-aided simulation to manufacturing systems in cyber-physical systemsThey discussed the construction and implementation methods of digital twin (DT). In this study also explained the issues involved in developing DT with the help of IoT manufacturing devices. DT is the simulation tool that can gather and synchronize data for the real world to a real-time environment.The absence of experimentation and optimization in predicting future locations or results are other essential aspects of DT.
Rahman et al. [ ]DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architectureIn this work, the authors develop a distributed blockchain-based security system integrated with the help of IoT and SDN. Blockchain is used for data security and confidentiality, while SDN-IoT incorporates sensor networks and IoT devices to improve the security services in Industry 4.0.Limitations of this study are that the developed model SDN-IoT was still in the initial stage, so it was not able to detect different types of risks, such as service denial (DoS) and flood attack and packet filtering. The developed system had no proper GUI, so the throughput, packet arrival time, and response time were rarely challenging to analyze.
Haque et al. [ ]Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoringThey developed a computer-based monitoring system to analyze the vibration or earthquake measurement. WSN are used to sense structural damages and identify their pinpoint location. They also proposed a topology-based maintenance system to analyze network architecture. Their system was an energy-efficient system that automatically turned off nodes where no traffic was detected.The limitation of this study is that WSN nodes are not capable enough to provide scalability for large coverage areas.
Wan et al. [ ]Toward dynamic resources management for IoT-based manufacturingTo build a fully interactive environment and dynamic management of resources, an ontology-based technology, SDN, communication technology device to device combined with ontology modeling and multi-agency technology were used to accomplish sophisticated administration of resources. They solved load secluding problems using Jena logic reasoning and contract-net protocol-based technology in Industry 4.0.The limitation of this work was the high time complexity of the load balancing algorithm to complete the task efficiently. It was challenging to refine the process due to the complex nature of multi-agent technology, and referencing rules were much more complex.
Bulaghi et al. [ ]SENET: a novel architecture for IoT-based body sensor networksMultiple algorithms, such as particle swarm optimization (PSO), ant colony optimization (ACO), and genetic algorithms (GA) were used to save energy of WSN. They evaluated WSN energy consumption using optimization algorithms and calculated the total number of uncovered points, their stability, and dependability.The design meets some disadvantages and does not work in real-time data.
Thiago et al. [ ]A comprehensive dependability model for QoM-aware Industrial WSNWhen performing visual area coverage in occluded scenarios. They proposed a mathematical model named quality of monitoring parameter (QoM) to assess the dependability of WSN, their availability, and reliability considering hardware, networking, and visual coverage failures.Their developed method was inefficient at analyzing the system’s dependability in real-time applications due to failures or repairs happening as soon.
Patricia et al. [ ]Wireless sensor network combined with cloud computing for air quality monitoringThey designed a small size, low cost, and efficient system to monitor the air quality using wireless sensor nodes. They performed multiple algorithms such as multi-layer perceptron, SVM, and PCA to discriminate and quantify the volatile organic compounds.The limitation of this study is that sensor nodes are less efficient at covering a large area to monitor and cannot do real-time testing and the field measurements of sensors.
Li et al. [ ]Edge computing-enabled wireless sensor networks for multiple data collection tasks in smart agricultureThey designed a data collection algorithm considering data quality factors in smart agriculture. Then modeled the data collection process by merging WSN and IoT.The developed edge computing driven framework [ ] and data collection algorithm were not capable of collecting data in a real agriculture environment.
Kumar et al. [ ]Cluster centroid-based energy-efficient routing protocol for WSN-assisted IoTThey developed a system that was capable of self-organization of local nodes to save energy. Their system adopted new algorithms to rotate head clusters based on centroid locations in IoT using WSN. The technique exceeds conventional protocols for efficiency criteria, such as the consumption of energy by the network, intermediate sensor node, packet distribution ratio, packet failure percentage, and network output. Their work was best for the base station located in the network.The routing protocol was not optimal, routing strategies were lacking, and packet loss was caused if the base stations were even in the network. In the future, they will enhance this work by using a multi-hop path strategy to the base station. In this technique, the cluster head will transmit data to the base station, even outside the network.
Haseeb et al. [ ]An energy-efficient and secure IoT-based WSN framework: an application to smart agricultureThey proposed an IoT-based WSN framework that collected data from agriculture and transmitted it to the nearest base station. They enhanced network throughput, low latency rate, energy consumption, and packet drop ratio. They also provided security to the data transmission channel using the recurrence of the linear generator.The limitation of this work is that they did not assess the device consistency in a mobile IoT. Therefore, they will analyze the performance and reliability of developed frameworks in the transportation system and mobile-based IoT network.

5. Challenges and Open Issues

Intelligent systems can address various problems faced by industry, but there have been some challenges in integrating IoT and WSN into Industry 4.0. Technological improvements in IoT and WSN have increased concerns about security and data management [ 96 ]. As more and more data is generated, it is difficult for factories and industries to manage it properly. Artificial intelligence algorithms have been implemented to manage Big Data and make systems and devices act more intelligently. The algorithms are used to process the data in different time periods. For education, the data must be shared in a central repository, while enterprises are mainly reluctant to share their private data due to poor and insufficient organizational support for data in Industry 4.0. There are also safety management issues in Industry 4.0 [ 116 ].

Big data : The emergence of various technologies and the explosion of their use have led to the outstanding development of Big Data technology and processing. Every device produces a huge amount of data. Due to the growing amount of big data, the improvements of Big Data packages encounter limitations and demand situations that need to be “overcome” in order to manage the amount of data used efficiently.

Adapting to 6G : 6G is another challenge for wireless sensor networks and the Internet of Things. Processing power is a major challenge in developing low-power and low-cost 6G devices. In addition, 6G brings privacy and security challenges for WSN and IoT.

Updates :system components could not be upgraded due to interoperability between protocols, systems, and their components. Therefore, systems are more vulnerable to attack if any part of a single system from a network is infected in intelligent factories.

Environment : security is also a critical challenge in WSN [ 97 , 100 , 106 ]. WSN nodes are not secure when deployed in a prone environment due to the wireless transmission of data. An attacker can access them from anywhere in the world and manipulate them easily. Internet attacks can also affect the vulnerability of sensor nodes.

Supply chain management systems : IoT devices are spreading erery day, posing new challenges to the integrity and scalability of supply chain management systems [ 117 , 118 ]. Simultaneously connecting IoT devices to the cloud or the Internet requires a lot of access control, fault tolerance, data management, privacy, and security.

Limited resources : are other challenges in WSN domain that affect the energy of sensor nodes used in the network. Sensor nodes usually change their mode from sleep to active and vice versa. Therefore, sleep mode is considered as "outside the network" while active mode brings some other issues such as energy consumption [ 119 ]. Due to the high energy consumption, they also became dead. Sensor nodes usually have limited power, processing, and memory. In addition, sensor mobility is another problem that hinders the integration of mobile sensor nodes with the Internet.

6. Future Directions

Industry 4.0 leads to the merging of people and technology to complement human activities with intelligent machines. Industry 4.0 will lead to customized human fashion that will minimize the oversupply and unavailability of supplies or items. Human-machine interaction will increase productivity and customer satisfaction with customized products.

The next version of Industry 4.0 is Industry 5.0, which is expected to be more user-friendly and better integrate technology with society and the environment. It depends mainly on robots. Robots are already the backbone of manufacturing, and Industry 4.0 technologies [ 120 , 121 ] provide flexibility in manufacturing. Industry 5.0 combines human creativity and craftsmanship with the speed, productivity (e.g., CPS) [ 122 ], and consistency of robots. In this version, robots can be programmed to work alongside humans.

Soft computing : can be used to reduce the dimensions of these large dimensional data sets [ 123 ]. Good features are essential to make efficient decisions. This is the reason why soft computing techniques are used to obtain useful features.

Explainable artificial intelligence (XAI) : can be used for interpretability of the decision made by the classification model. Classification models make decisions in a black box where the user does not know how the decision is made. XAI converts this black box into a white box and interprets the decision made by a model. XAI increases user confidence to take further action [ 124 ].

Federated learning (FL): is an optimal choice for privacy preservation. FL works by training global and local models on the edge device. The model on the edge device does not share the data with the global, thus keeping the data private at each edge device. Only parameters are shared globally to retrain the global model and optimize the inference results [ 125 , 126 ].

Secure devices : sensor nodes are designed to consume less energy and become active when they are needed or an event occurs [ 59 ]. Further improvements are also needed to prevent attacks from the Internet. While the IoT has no limitations in terms of processing or energy. Due to the tremendous proliferation of IoT devices, this paradigm is now being shifted from the IoT to the Internet of Everything.

Sustainability : IoT systems are now moving toward the idea of self-organization, and systems are becoming capable of responding in an automated and adaptive manner and dealing with changes and uncertainties in the environment [ 118 ].

Education 5.0 : in this digital era, education must also change from traditional to integrating hardware and software with co-bots to develop new skills and a smart society. Educational institutes are now using pedagogical tools to provide a better experience. Even though IoT-based education is still not widespread, there is still room for further improvement, such as sensor node coverage and efficiency, wireless data transmission of data [ 127 ], battery life, and high-cost nodes.

General directions: there are many challenges. Future directions may address heterogeneous interoperability of systems, self-organization protocols, routing schemes for managing IoT networks, data management [ 79 ], cross-platform optimization, and the development of network security algorithms to secure wireless transmission from data manipulation, stealing, or hacking activities. On the hardware side, researchers are developing energy-efficient sensor nodes [ 91 , 115 ], with net-zero power to reduce maximum power consumption.

7. Conclusions

In this digital and modern era, technology is evolving every day. Due to the massive proliferation of technology, IoT and WSN play an important role in Industry 4.0 to develop smart applications, design networked data centers, and build autonomous smart industries. Data networks have been created and improved with the help of new and smart devices. In this systematic literature review, WSN and IoT network threats were analyzed and a descriptive comparative study was conducted. These networks are the main attack surfaces for attackers to draw meaningful patterns from system and user data. Wireless sensor networks (WSN) and the Internet of Things (IoT) have rapidly (and widely) evolved to meet the increasing demand for conventional application scenarios, such as plant automation and remote process control systems. These smart devices are also being used to improve the efficiency of existing networks and create new opportunities for automating and securing industrial processes. In this article, we explore seven research questions: (i) What are the contributions of WSN in IR4. 0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the main types of network intrusions in WSN and IoT systems? (v) What are the main network security attacks in WSN and IoT? (vi) What are the major issues in IoT and WSN systems? (vii) What are the limitations and research gaps in the current work? The main purpose of the fourth industrial revolution with WSN and IoT explicitly shows that the evolutionary transition needs to be intensified and extended to include emerging research areas and intimidating technological challenges. This article covers all elements of WSN, from the design phase to the security requirements, from the implementation phase to the classification of the network, and from the difficulties and challenges of WSN. Future studies will address the problems in the coverage regions of wireless sensor networks and provide effective solutions to the existing problems and challenges in this area. The use and application of WSN and IoT in Industry 4.0 involves the processing of extracted data and the efficient and secure transmission of this data to a remote location.

Author Contributions

Conceptualization, M.M., M.R. and S.H.; data curation, S.H.; formal analysis, A.R.J.; funding acquisition, T.R.G.; investigation, A.R.J.; methodology, A.R.J.; project administration, J.C.-W.L. and T.R.G.; resources, G.S. and T.R.G.; software, A.R.J.; supervision, A.R.J. and J.C.-W.L.; validation, S.H. and M.M.; visualization, S.H. and M.R.; writing—review and editing, G.S., T.R.G. and M.R. All authors have read and agreed to the published version of the manuscript.

This paper is partially supported by the Western Norway University of Applied Sciences, Bergen, Norway.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Data availability statement, conflicts of interest.

The authors declare no conflict of interest.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

8 Latest Thesis and Research Areas in Wireless Sensor Network (WSN

Profile image of Write Mythesis

Write myThesis

A wireless sensor network or WSN is a wireless network of devices that communicate with each other through wireless links such that each device has a sensor to monitor its surrounding environment. The wireless connectivity between the nodes is provided through a gateway to ensure data transfer between the nodes. A typical network has a base station along with the sensory nodes.

Related Papers

IJARBEST INTERNATIONAL SCIENTIFIC PUBLICATIONS

The Wireless Sensor Network (WSN) is a distributed Ad-hoc network that consists of numerous and ubiquitous mini sensor nodes with the capabilities of wireless communicating and computing.

wireless sensor networks latest research papers

International Journal of Mathematical Archive ( …

Akhil Kaushik

Wireless sensor networks (WSNs) are a new and emerging type of sensor networks that contain sensor nodes equipped with a radio transceiver, other wireless communications devices like a small microcontroller and an energy source, usually a battery. Wireless ...

Ijetrm Journal

This paper gives an overview of WSNs advances, conventions, principle applications, dangers and difficulties in WSNs. Because of the incomprehensible capability of sensor systems to empower applications that interface the physical world to the virtual world, the efficient outline and usage of remote sensor systems has turned out to be a standout amongst the most vital advancements for the twenty-first century. A WSN regularly comprises of a substantial number of minimal effort, low-control, and multifunctional remote sensor hubs, with detecting, remote correspondences and calculation capacities. The movement of detecting, preparing, and correspondence under restricted measure of vitality, lights a cross-layer configuration approach commonly requiring the joint thought of disseminated flag/information handling, medium get to control, and correspondence conventions. In this paper different conventions for remote sensor system are talked about. WSN might be vulnerable for different assaults, which are examined under dangers. The fundamental application ranges for WSNs are additionally examined here. INTRODUCTION With the prominence of tablets, PDAs, PDAs, GPS gadgets, RFID, and canny hardware in the post-PC period, figuring gadgets have turned out to be less expensive, more versatile, more circulated, and more unavoidable in everyday life. It is presently conceivable to develop, from business off-the-rack (COTS) parts, a wallet estimate inserted framework with the equal ability of a 90's PC. Such implanted frameworks can be bolstered with downsized Windows or Linux working frameworks. From this viewpoint, the development of remote sensor systems (WSNs) is basically the most recent pattern of Moore's Law toward the scaling down and universality of processing gadgets. Ordinarily, a remote sensor hub (or basically sensor hub) comprises of detecting, processing, correspondence, activation, and power parts. These parts are incorporated on a solitary or numerous sheets, and bundled in a couple of cubic inches. With cutting edge, low-control circuit and systems administration advances, a sensor hub controlled by 2 AA batteries can keep going for up to three years with a 1% low obligation cycle working mode. A WSN for the most part comprises of tens to a great many such hubs that impart through remote channels for data sharing and helpful handling. WSNs can be sent on a worldwide scale for natural observing and living space consider, over a combat zone for military observation and surveillance, in new situations for inquiry and safeguard, in manufacturing plants for condition based support, in structures for foundation wellbeing checking, in homes to acknowledge savvy homes, or even in bodies for patient checking. After the underlying arrangement (normally specially appointed), sensor hubs are in charge of self-sorting out a fitting system foundation, data handling and directing in Wireless Sensor Networks with multi-jump associations between sensor hubs. The installed sensors then begin gathering acoustic, seismic, infrared or attractive data about nature, utilizing either consistent or occasion driven working modes. Area and situating data can likewise be gotten through the worldwide situating framework (GPS) or neighbourhood situating calculations. This data can be accumulated from over the system and suitably handled to develop a worldwide perspective of the observing wonders or questions. The essential theory behind WSNs is that, while the capacity of every individual sensor hub is restricted, the total force of the whole system is adequate for the required mission. A WSN can be by and large portrayed as a system of hubs that helpfully sense and may control the

BHAWANA GOEL

Due to many restrictions, wireless sensor networks (WSNs) offer novel applications and need novel protocol design approaches. Due to the demand for minimal device complexity and low energy consumption (i.e., a long network lifespan), it is necessary to strike a balance between communication and signal/data processing capabilities. This has resulted in a tremendous amount of effort in research, standardisation, and industry investment in this subject during the previous decade. This survey article will provide an overview of wireless sensor network (WSN) technology, major applications and standards, design characteristics of WSNs, and evolutions. The article discusses various unusual applications, such as those involving environmental monitoring, and highlights design ideas; it also includes a case study based on a real-world implementation. The author charts trends and potential evolutions. The IEEE 802.15.4 standard is emphasised, since it offers a wide variety of WSN applications....

Wireless Sensor Networks - Technology and Protocols

Mohammad Matin

Mohmmed Munna

WIRELESS SENSOR NETWORKS (Technology, Protocols, and Applications)

Nnaemeka Onuekwusi

The plethora of research and development efforts on Wireless Sensor Networks is an indication that the technology has emerged an active research area in recent times. In this paper, a review of this intelligent technology is undertaken. Its working mechanisms, merits, challenges, transmission technologies, simulating tools and applications are considered. The paper concludes with a clear conviction that a sound knowledge of the basics of this technology is a sine qua non to research and development of the technology.

Lina M. P.L. Brito

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

arpita jain

Editor Ijasre

IJESRT Journal

Journal of Computer …

Ahmad Alkhatib

Rashmi Vashisth

Arpita Jain

International Journal of Sensors and Sensor Networks

Anower Hossain

kamlesh patel

ankush goyal

chanchal antony

IOSR Journal of Computer Engineering

Mayuri Bapat

Anand S Deshbhratar, (PhD)

International Journal of Computer Applications

iJSRED Journal

Rojina Shakya , Gajendra Sharma

Automation, Quality and Testing, …

Gil Gonçalves

Wireless Sensor Networks: Application-Centric Design

Ilangko Balasingham

IJSRD - International Journal for Scientific Research and Development

Editor IJRET

International Journal on Recent and Innovation Trends in Computing and Communication

NILAYAM K KAMILA

Maheswari 1995

Aderemi A . Atayero

Kingsley E Ukhurebor

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Wireless Networks
  • Computer Networks
  • Computer Science
  • Computer Communications (Networks)
  • Wireless Sensor Network

Wireless Sensor Network Security

  • December 2009
  • International Journal of Next-Generation Networks 1(1)

Hemanta Kumar Kalita at North Eastern Hill University

  • North Eastern Hill University

Kar Avijit

Abstract and Figures

Data-link Layer Threats and Countermeasures

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Karishma Dobhal

  • Koteswararao Seelam
  • A V Subbarao
  • M. Rajani Devi
  • ARTIF INTELL REV
  • Andrew C. Cullen

Benjamin I. P. Rubinstein

  • Philip H.W. Leong

Bruno Carneiro da Rocha

  • Naseem Kadhim Baqer
  • Ameen M Al-Modaffer

Ghufran Shahtoor

  • Engin Leloglu
  • Mona Sharifnejad

Mohsen Sharifi

  • Boyle David

Thomas Newe

  • Erran L. Li

Jorge Granjal

  • A. Banerjea
  • AD HOC NETW

Chris Karlof

  • David Wagner
  • John R. Douceur
  • Adrian Perrig

Robert Szewczyk

  • J. D. Tygar

David E. Culler

  • Shriram Sharma
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up
  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

2 persons sitting in front of laptop

Cisco Security

Master your goals. innovate. we'll tackle threats..

Get powerful security across all your networks, cloud, endpoints, and email to protect everything that matters, from anywhere.

If it's connected, you're protected

Hacker working at multiple computer screens

Cisco Security “The Hacker”

More connected users and devices creates more complexity. Cisco Security Cloud makes security easier for IT and safer for everyone anywhere security meets the network.

Deliver smarter, stronger security

Protect your organization across a multicloud environment, while simplifying security operations, improving scalability, and driving data-informed outcomes, powered by Cisco Talos.

Unlock better user experiences

Create a seamless experience that frustrates attackers, not users, by granting access from any device, anywhere, and adding more proactive security controls.

Deliver cost-effective defenses

Improve ROI by consolidating vendors, reducing complexity and integrating your security.

Strengthen security resilience

Unified, end-to-end protection maximizes value, minimizes risk, and closes security gaps everywhere to defend against evolving threats. Protect access, apps, and innovation across your network to secure your future.

wireless sensor networks latest research papers

Cisco Secure Firewall

Better visibility and actionable insights across networks, clouds, endpoints, and email allows users to respond confidently to the most sophisticated threats at machine scale.

Featured security products

Cisco hypershield.

A new groundbreaking security architecture that makes hyperscaler technology accessible to enterprises of all sizes and delivers AI-native security for modern data centers and cloud.

Cisco Secure Access (SSE)

A converged cybersecurity solution, grounded in zero trust, that radically reduces risk and delights both end users and IT staff by safely connecting anything to anywhere.

Detect the most sophisticated threats sooner across all vectors and prioritize by impact for faster responses.

Cisco Multicloud Defense

Gain multidirectional protection across clouds to stop inbound attacks, data exfiltration, and lateral movement.

Secure applications and enable frictionless access with strong MFA and more. Establish user and device trust, gain visibility into devices, and enable secure access to all apps.

Cisco Identity Services Engine (ISE)

Simplify highly secure network access control with software-defined access and automation.

Security Suites delivered by Cisco Security Cloud

User Protection Suite

Cisco User Protection Suite

Get secure access to any application, on any device, from anywhere. Defend against threats targeting users and deliver seamless access for hybrid work.

Cloud Protection Suite

Cisco Cloud Protection Suite

Secure your apps and data with a powerful, flexible framework for a hybrid and multicloud world.

Breach Protection Suite

Cisco Breach Protection Suite

Secure your business by investigating, prioritizing, and resolving incidents through unified defense and contextual insights from data-backed, AI-powered security.

Customer stories and insights

Global partnerships fight to end child exploitation together.

Marriott International

"Marriott has long championed human rights and human trafficking awareness. Combating CSAM is an important extension of that work. The IWF provided the level of rigor we needed in a URL list, and Cisco's security technology provided the means to easily apply it."

Abbe Horswill, Director, Human Rights and Social Impact

Company: Marriott International

The NFL relies on Cisco

NFL logo

"From securing stadiums, broadcasts, and fans to protecting the largest live sporting event in America, the right tools and the right team are key in making sure things run smoothly, avoiding disruptions to the game, and safeguarding the data and devices that make mission-critical gameday operations possible."

Add value to security solutions

Cisco Security Enterprise Agreement

Instant savings

Experience security software buying flexibility with one easy-to-manage agreement.

Services for security

Let the experts secure your business

Get more from your investments and enable constant vigilance to protect your organization.

Sharpen your security insights

Cisco Cybersecurity Viewpoints

Set your vision to a more secure future with Cisco Cybersecurity Viewpoints. With specialized content from podcasts to industry news, you'll walk away with a deeper understanding of the trends, research, and topics in our rapidly changing world.

Urban Green Space Planning Based on Remote Sensing Image Enhancement and Wireless Sensing Technology

  • Published: 12 August 2024

Cite this article

wireless sensor networks latest research papers

  • Chengzhi Ruan 1 ,
  • Qiang Gao 1 &
  • Biao Yan 1  

Explore all metrics

Traditional urban green space planning methods often rely on site survey and manual mapping, which is inefficient and costly. In order to solve these problems, a new urban green space planning method is proposed based on remote sensing image enhancement technology and wireless sensing technology. In this paper, remote sensing image technology is used to obtain high-resolution urban green space images, and image enhancement algorithm is used to improve the clarity and recognition of the images. Then through the wireless sensor network in the green space, real-time environmental data is collected. Finally, combined with remote sensing data and sensor data, a comprehensive analysis is carried out to develop a reasonable green space planning scheme. The results show that the urban green space planning method based on remote sensing image enhancement and wireless sensing technology not only improves the accuracy and efficiency of green space monitoring, but also significantly reduces the cost. The real-time environmental data obtained by wireless sensors can more accurately reflect the ecological status of green space, and contribute to scientific planning and management of urban green space. Therefore, the combination of remote sensing image enhancement and wireless sensing technology provides an efficient and low-cost new way for urban green space planning.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

wireless sensor networks latest research papers

Similar content being viewed by others

wireless sensor networks latest research papers

Urban Green Space Landscape Pattern Evaluation Based on High Spatial Resolution Images

wireless sensor networks latest research papers

Evaluating urban green and blue spaces with space-based multi-sensor datasets for sustainable development

wireless sensor networks latest research papers

RETRACTED ARTICLE: Green urban vegetation planning and economic efficiency based on remote sensing images and grid geographic space

Explore related subjects.

  • Artificial Intelligence

Data availability

No datasets were generated or analysed during the current study.

Kondo MC, Fluehr JM, McKeon T, Branas CC (2018) Urban green space and its impact on human health. Int J Environ Res Public Health 15(3):445

Article   Google Scholar  

Rigolon A, Browning MH, McAnirlin O, Yoon H (2021) Green space and health equity: a systematic review on the potential of green space to reduce health disparities. Int J Environ Res Public Health 18(5):2563

Agrawal S, Khairnar GB (2019) A comparative assessment of remote sensing imaging techniques: optical, sar and lidar. Int Arch Photogramm Remote Sens Spat Inf Sci 42:1–6

Wang W, Yang N, Zhang Y, Wang F, Cao T, Eklund P (2016) A review of road extraction from remote sensing images. J Traffic Transp Eng (Engl Ed) 3(3):271–282

Google Scholar  

Zhang J, Zhang X, Tan S, Xie X (2017) Design and manufacture of an off-axis aluminum mirror for visible-light imaging. Curr Opt Photon 1(4):364–371

Haaland C, van Den Bosch CK (2015) Challenges and strategies for urban green-space planning in cities undergoing densification: a review. Urban For Urban Green 14(4):760–771

Wolch JR, Byrne J, Newell JP (2014) Urban green space, public health, and environmental justice: the challenge of making cities ‘just green enough.’ Landsc Urban Plan 125:234–244

Aronson MF, Lepczyk CA, Evans KL et al (2017) Biodiversity in the city: key challenges for urban green space management. Front Ecol Environ 15(4):189–196

Tan TH (2016) Residential satisfaction in gated communities: case study of desa park city, Kuala Lumpur Malaysia. Property Manag 34(2):84–99

Liu J, Xiong Y, Wang Y, Luo T (2018) Soundscape effects on visiting experience in city park: a case study in Fuzhou China. Urban For Urban Green 31:38–47

Reklaitiene R, Grazuleviciene R, Dedele A et al (2014) The relationship of green space, depressive symptoms and perceived general health in urban population. Scand J Public Health 42(7):669–676

Liu Y, Pang C, Zhan Z, Zhang X, Yang X (2020) Building change detection for remote sensing images using a dual-task constrained deep siamese convolutional network model. IEEE Geosci Remote Sens Lett 18(5):811–815

Menon V, Uddin LQ (2010) Saliency, switching, attention and control: a network model of insula function. Brain Struct Funct 214:655–667

Reddy T, McLaughlin PD, Mallinson PI, Reagan AC, Munk PL, Nicolaou S, Ouellette HA (2015) Detection of occult, undisplaced hip fractures with a dual-energy CT algorithm targeted to detection of bone marrow edema. Emerg Radiol 22:25–29

Nurullayev S, Lee SW (2019) Generalized parking occupancy analysis based on dilated convolutional neural network. Sensors 19(2):277

Anwar S, Hwang K, Sung W (2017) Structured pruning of deep convolutional neural networks. ACM J Emerg Technol Comput Syst (JETC) 13(3):1–18

Download references

This paper was supported by Fujian Provincial Department of Education: Application of image processing in color separation of tea impurities, No.S202110397058.

Author information

Authors and affiliations.

College of Mechanical and Electrical Engineering, Wuyi University, Wuyishan, 354300, Fujian, China

Tao Xu, Bo Guo, Chengzhi Ruan, Qiang Gao & Biao Yan

You can also search for this author in PubMed   Google Scholar

Contributions

The first version was written by Tao Xu, at the same time, Bo Guo and Chengzhi Ruan has done the simulations. Qiang Gao and Biao Yan has done the analysis. All authors have contributed to the paper’s analysis, discussion, writing, and revision.

Corresponding author

Correspondence to Tao Xu .

Ethics declarations

Competing interests.

The authors declare no competing interests.

Ethical approval

Not applicable.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Xu, T., Guo, B., Ruan, C. et al. Urban Green Space Planning Based on Remote Sensing Image Enhancement and Wireless Sensing Technology. Mobile Netw Appl (2024). https://doi.org/10.1007/s11036-024-02380-2

Download citation

Accepted : 05 August 2024

Published : 12 August 2024

DOI : https://doi.org/10.1007/s11036-024-02380-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Remote sensing image
  • Image enhancement
  • Wireless sensing technology
  • Urban green space planning

Advertisement

  • Find a journal
  • Publish with us
  • Track your research

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sustainability-logo

Article Menu

wireless sensor networks latest research papers

  • Subscribe SciFeed
  • Recommended Articles
  • Author Biographies
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

The role of 6g technologies in advancing smart city applications: opportunities and challenges.

wireless sensor networks latest research papers

1. Introduction

  • Literature Survey and Review Process
  • Step-1: Literature Retrieval
  • Step-2: Literature Filtering
  • Step-3: Classification
  • Through this article, we have extensively covered in detail the potential 6G technologies in terms of requirements, architecture, visions, and usage, which are anticipated to be integrated in futuristic 6G-enabled smart cities.
  • Secondly, we have discussed prominent smart city applications with underlying 6G technologies. This includes smart waste management, smart healthcare, smart grids, and more.
  • Thirdly, potential challenges are also highlighted along with discussion on each technology and application. Also, at the end of this survey paper, challenges and suggestions for possible future research directions are also highlighted for the 6G-enabled smart city paradigm.
  • Research Objectives
  • Structure of Paper

2. Potential 6G Enabling Technologies

2.1. role of ai in 6g and smart city arena, 2.1.1. applications, 2.1.2. challenges, 2.2. role of integrated sensing and communication (isac) in smart city concept, 2.2.1. applications, 2.2.2. challenges, 2.3. iot for smart cities with 6g, 2.3.1. characteristics of 6g-iot, 2.3.2. classification of iot, 2.4. blockchain (bc) and 6g-enabled smart cities, 2.5. terahertz (thz) communication, 2.5.1. applications/use cases, 2.5.2. challenges, 2.6. quantum communication (qc), 2.6.1. applications, 2.6.2. challenges, 2.7. immersive communication (ic), 2.7.1. types of immersive communication, 2.7.2. use cases for immersive communication, 2.8. visible light communication (vlc), 2.8.1. free-space optics (fso), 2.8.2. fiber-wireless system (fiwi), 2.8.3. power over fiber (pof), 2.8.4. challenges, 2.9. mobile edge computing (mec), applications, 2.10. reconfigurable intelligent surfaces (riss), 2.11. non-terrestrial networks (ntns), 2.11.1. airborne base stations (abs), uavs, and drones uses in a 6g smart city, applications/benefits, 2.11.2. satellite communication, 3. applications of 6g in smart cities, 3.1. industrial automation and smart manufacturing, 3.2. vehicle-to-everything (v2x) technology in smart cities, use cases of v2x, 3.3. smart healthcare, 3.4. smart grid, 3.5. smart waste management, 4. conclusions, open challenges and possible future research, conflicts of interest.

  • Xin, B.; Qu, Y. Effects of smart city policies on green total factor productivity: Evidence from a quasi-natural experiment in China. Int. J. Environ. Res. Public Health 2019 , 16 , 2396. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Antwi-Afari, P.; Owusu-Manu, D.G.; Simons, B.; Debrah, C. Ato Ghansah Sustainability guidelines to attaining smart sustainable cities in developing countries: A ghanaian context Sustain. Futures 2021 , 3 , 100044. [ Google Scholar ]
  • UN [United Nations]. The 2030 Agenda for Sustainable Development ; UN [United Nations]: San Francisco, CA, USA, 2015. [ Google Scholar ]
  • Cartalis, C. Toward resilient cities—A review of definitions, challenges and prospects. Adv. Build. Energy Res. 2014 , 8 , 259–266. [ Google Scholar ] [ CrossRef ]
  • Voytenko, Y.; Mccormick, K.; Evans, J.; Schliwa, G. Urban living labs for sustainability and low carbon cities in Europe: Towards a research agenda. J. Clean. Prod. 2016 , 123 , 45–54. [ Google Scholar ] [ CrossRef ]
  • Sharifi, A. A typology of smart city assessment tools and indicator sets. Sustain. Cities Soc. 2020 , 53 , 101936. [ Google Scholar ] [ CrossRef ]
  • Weber-Lewerenz, B.; Traverso, M. Navigating Applied Artificial Intelligence (AI) in the Digital Era: How Smart Buildings and Smart Cities Become the Key to Sustainability. J. Artif. Intell. Appl. (AIA) 2023 , 1 , 230–243. [ Google Scholar ] [ CrossRef ]
  • Blasi, S.; Ganzaroli, A.; De Noni, I. Smartening Sustainable Development in Cities: Strengthening the Theoretical Linkage between Smart Cities and SDGs. Sustain. Cities Soc. 2022 , 80 , 103793. [ Google Scholar ] [ CrossRef ]
  • Smart Cities Market—Global Industry Analysis, Size, Share, Growth, Trends, Regional Outlook, and Forecast 2023–2033. Available online: https://www.precedenceresearch.com/smart-cities-market (accessed on 27 July 2024).
  • Ishteyaq, I.; Muzaffar, K.; Shafi, N.; Alathbah, M.A. Unleashing the Power of Tomorrow: Exploration of Next Frontier with 6G Networks and Cutting Edge Technologies. IEEE Access 2024 , 12 , 29445–29463. [ Google Scholar ] [ CrossRef ]
  • Tariq, F.; Khandaker, M.R.; Wong, K.-K.; Imran, M.A.; Bennis, M.; Debbah, M. A speculative study on 6G. IEEE Wirel. Commun. 2020 , 27 , 118–125. [ Google Scholar ] [ CrossRef ]
  • IMT Traffic Estimates for the Years 2020 to 2030, Document ITU 0-2370. 2015. Available online: https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2370-2015-PDF-E.pdf (accessed on 27 July 2024).
  • ITU. IMT towards 2030 and Beyond. 2023. Available online: https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2030/Pages/default.aspx (accessed on 27 July 2024).
  • Dang, S.; Amin, O.; Shihada, B.; Alouini, M.-S. What should 6G be? Nat. Electron. 2020 , 3 , 20–29. [ Google Scholar ] [ CrossRef ]
  • Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Karagiannidis, G.K.; Fan, P. 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 2019 , 14 , 28–41. [ Google Scholar ] [ CrossRef ]
  • Kugley, S.; Wade, A.; Thomas, J.; Mahood, Q.; Anne-Marie Klint, J.; Hammerstrøm, K.; Sathe, N. Searching for studies: A guide to information retrieval for Campbell systematic reviews. Campbell Syst. Rev. 2017 , 13 , 1–73. [ Google Scholar ] [ CrossRef ]
  • Fong, B.; Kim, H.; Fong, A.C.M.; Hong, G.Y.; Tsang, K.F. Reliability Optimization in the Design and Implementation of 6G Vehicle-to-Infrastructure Systems for Emergency Management in a Smart City Environment. IEEE Commun. Mag. 2023 , 61 , 148–153. [ Google Scholar ] [ CrossRef ]
  • Mishra, P.; Singh, G. 6G-IoT Framework for Sustainable Smart City: Vision and Challenges. IEEE Consum. Electron. Mag. 2024 , 13 , 93–103. [ Google Scholar ] [ CrossRef ]
  • Parvaresh, N.; Kantarci, B. A Continuous Actor–Critic Deep Q-Learning-Enabled Deployment of UAV Base Stations: Toward 6G Small Cells in the Skies of Smart Cities. IEEE Open J. Commun. Soc. 2023 , 4 , 700–712. [ Google Scholar ] [ CrossRef ]
  • Yang, Z.; Hu, D.; Guo, Q.; Zuo, L.; Ji, W. Visual E2C: AI-Driven Visual End-Edge-Cloud Architecture for 6G in Low-Carbon Smart Cities. IEEE Wirel. Commun. 2023 , 30 , 204–210. [ Google Scholar ] [ CrossRef ]
  • Sehito, N.; Shouyi, Y.; Alshahrani, H.M.; Alamgeer, M.; Dutta, A.K.; Alsubai, S.; Nkenyereye, L.; Dhanaraj, R.K. Optimizing User Association, Power Control and Beamforming for 6G Multi-IRS Multi-UAV NOMA Communications in Smart Cities. IEEE Trans. Consum. Electron. 2024 . [ Google Scholar ] [ CrossRef ]
  • Singh, P.R.; Singh, V.K.; Yadav, R.; Chaurasia, S.N. 6G networks for artificial intelligence-enabled smart cities applications: A scoping review. Telemat. Inform. Rep. 2023 , 9 , 100044. [ Google Scholar ] [ CrossRef ]
  • Murroni, M.; Anedda, M.; Fadda, M.; Ruiu, P.; Popescu, V.; Zaharia, C.; Giusto, D. 6G—Enabling the New Smart City: A Survey. Sensors 2023 , 23 , 7528. [ Google Scholar ] [ CrossRef ]
  • Kamruzzaman, M.M. Key Technologies, Applications and Trends of Internet of Things for Energy-Efficient 6G Wireless Communication in Smart Cities. Energies 2022 , 15 , 5608. [ Google Scholar ] [ CrossRef ]
  • Kim, N.; Kim, G.; Shim, S.; Jang, S.; Song, J.; Lee, B. Key Technologies for 6G-Enabled Smart Sustainable City. Electronics 2024 , 13 , 268. [ Google Scholar ] [ CrossRef ]
  • Ismail, L.; Buyya, R. Artificial Intelligence Applications and Self-Learning 6G Networks for Smart Cities Digital Ecosystems: Taxonomy, Challenges, and Future Directions. Sensors 2022 , 22 , 5750. [ Google Scholar ] [ CrossRef ]
  • Qadir, Z.; Le, K.N.; Saeed, N.; Munawar, H.S. Towards 6G Internet of Things: Recent advances, use cases, and open challenges. ICT Express 2023 , 9 , 296–312. [ Google Scholar ] [ CrossRef ]
  • Shafi, M.; Jha, R.K.; Jain, S. 6G: Technology Evolution in Future Wireless Networks. IEEE Access 2024 , 12 , 57548–57573. [ Google Scholar ] [ CrossRef ]
  • Lombardi, P.; Giordano, S.; Farouh, H.; Yousef, W. Modelling the smart city performance. Innovation 2012 , 25 , 137–149. [ Google Scholar ] [ CrossRef ]
  • Talebkhah, M.; Sali, A.; Marjani, M.; Gordan, M.; Hashim, S.J.; Rokhani, F.Z. IoT and Big Data Applications in Smart Cities: Recent Advances, Challenges, and Critical Issues. IEEE Access 2021 , 9 , 55465–55484. [ Google Scholar ] [ CrossRef ]
  • Singh, T.; Solanki, A.; Sharma, S.K.; Nayyar, A.; Paul, A. A Decade Review on Smart Cities: Paradigms, Challenges and Opportunities. IEEE Access 2022 , 10 , 68319–68364. [ Google Scholar ] [ CrossRef ]
  • Farooq, M.S.; Nadir, R.M.; Rustam, F.; Hur, S.; Park, Y.; Ashraf, I. Nested Bee Hive: A Conceptual Multilayer Architecture for 6G in Futuristic Sustainable Smart Cities. Sensors 2022 , 22 , 5950. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Zhu, Y.; Mao, B.; Kato, N. Intelligent Reflecting Surface in 6G Vehicular Communications: A Survey. IEEE Open J. Veh. Technol. 2022 , 3 , 266–277. [ Google Scholar ] [ CrossRef ]
  • Hijji, M.; Iqbal, R.; Pandey, A.K.; Doctor, F.; Karyotis, C.; Rajeh, W.; Alshehri, A.; Aradah, F. 6G Connected Vehicle Framework to Support Intelligent Road Maintenance Using Deep Learning Data Fusion. IEEE Trans. Intell. Transp. Syst. 2023 , 24 , 7726–7735. [ Google Scholar ] [ CrossRef ]
  • Kamruzzaman, M.; Hossin, A.; Alruwaili, O.; Alanazi, S.; Alruwaili, M.; Alshammari, N.; Alaerjan, A.; Zaman, R. IoT-Oriented 6G Wireless Network System for Smart Cities. Comput. Intell. Neurosci. 2022 , 2022 , 4436. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Bekkali, A.E.; Essaaidi, M.; Boulmalf, M. A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities. IEEE Access 2023 , 11 , 76359–76370. [ Google Scholar ] [ CrossRef ]
  • Samanta, S.; Sarkar, A.; Bulo, Y. Secure 6G Communication in Smart City Using Blockchain. In Proceedings of the Emerging Technologies in Data Mining and Information Security, Singapore, 4–10 May 2023; Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V., Eds.; Springer Nature: Singapore, 2023; pp. 487–496. [ Google Scholar ]
  • Tekale, S.; Rajagopal, R.; Bhoopathy, V. 6G: Transformation of Smart Cities with Blockchain and AI. In Challenges and Risks Involved in Deploying 6G and NextGen Networks ; IGI Global: Hershey, PA, USA, 2022; pp. 220–228. [ Google Scholar ]
  • Yadav, M.; Agarwal, U.; Rishiwal, V.; Tanwar, S.; Kumar, S.; Alqahtani, F.; Tolba, A. Exploring Synergy of Blockchain and 6G Network for Industrial Automation. IEEE Access 2023 , 11 , 137163–137187. [ Google Scholar ] [ CrossRef ]
  • Mohammed, N.J. Quantum cryptography in Convolution neural network approach in Smart cities. J. Surv. Fish. Sci. 2023 , 10 , 2043–2056. [ Google Scholar ]
  • Muheidat, F.; Dajani, K.; Tawalbeh, L.A. Security Concerns for 5G/6G Mobile Network Technology and Quantum Communication. Procedia Comput. Sci. 2022 , 203 , 32–40. [ Google Scholar ] [ CrossRef ]
  • Ali, M.Z.; Abohmra, A.; Usman, M.; Zahid, A.; Heidari, H.; Imran, M.A.; Abbasi, Q.H. Quantum for 6G communication: A perspective. IET Quantum Commun. 2023 , 10 , 12391. [ Google Scholar ] [ CrossRef ]
  • Manzalini, A. Quantum communications in future networks and services. Quantum Rep. 2020 , 2 , 221–232. [ Google Scholar ] [ CrossRef ]
  • Jahid, A.; Alsharif, M.H.; Hall, T.J. The convergence of Blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap. J. Netw. Comput. Appl. 2023 , 217 , 103677. [ Google Scholar ] [ CrossRef ]
  • Pajooh, H.H.; Demidenko, S.; Aslam, S.; Harris, M. Blockchain and 6G-Enabled IoT. Inventions 2022 , 7 , 109. [ Google Scholar ] [ CrossRef ]
  • Mukherjee, A.; De, D.; Dey, N.; Crespo, R.G.; Herrera-Viedma, E. DisastDrone: A Disaster Aware Consumer Internet of Drone Things System in Ultra-Low Latent 6G Network. IEEE Trans. Consum. Electron. 2023 , 69 , 38–48. [ Google Scholar ] [ CrossRef ]
  • Lucic, M.C.; Bouhamed, O.; Ghazzai, H.; Khanfor, A.; Massoud, Y. Leveraging UAVs to Enable Dynamic and Smart Aerial Infrastructure for ITS and Smart Cities: An Overview. Drones 2023 , 7 , 79. [ Google Scholar ] [ CrossRef ]
  • Wei, X.; Yang, H.; Huang, W. Low-delay Routing Scheme for UAV Communications in Smart Cities. IEEE Internet Things J. 2023 , 32 , 67131. [ Google Scholar ] [ CrossRef ]
  • Saini, H.K.; Jain, K.L. A New Way of Improving Network by Smart IoE with UAV. In Proceedings of the 2023 IEEE International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), Berlin, Germany, 4–8 May 2023; pp. 485–489. [ Google Scholar ]
  • Alawadhi, A.; Almogahed, A.; Azrag, E. Towards Edge Computing for 6G Internet of Everything: Challenges and Opportunities. In Proceedings of the 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), Jeddah, Saudi Arabia, 23–25 January 2023; pp. 1–6. [ Google Scholar ]
  • Konhäuser, W. Digitalization in Buildings and Smart Cities on the Way to 6G. Wirel. Pers. Commun. 2021 , 121 , 1289–1302. [ Google Scholar ] [ CrossRef ]
  • Cheng, C.; Lv, H.; Lv, Z. Sensing fusion in vehicular network digital twins for 6G smart city. ITU J. Future Evol. Technol. 2022 , 3 , 342–358. [ Google Scholar ] [ CrossRef ]
  • Du, J.; Jiang, C.; Wang, J.; Ren, Y.; Debbah, M. Machine learning for 6G wireless networks: Carrying forward enhanced bandwidth, massive access, and ultrareliable/low-latency service. IEEE Veh. Technol. Mag. 2020 , 15 , 122–134. [ Google Scholar ] [ CrossRef ]
  • Mikalef, P.; Lemmer, K.; Schaefer, C.; Ylinen, M.; Fjørtoft, S.O.; Torvatn, H.Y.; Gupta, M.; Niehaves, B. Enabling AI capabilities in government agencies: A study of determinants for European municipalities. Gov. Inf. Q. 2022 , 39 , 101596. [ Google Scholar ] [ CrossRef ]
  • Yigitcanlar, T.; Desouza, K.; Butler, L.; Roozkhosh, F.; Yigitcanlar, T.; Desouza, K.; Butler, L.; Roozkhosh, F. Contributions and risks of artificial intelligence (AI) in building smarter cities: Insights from a systematic review of the literature. Energies 2020 , 13 , 1473. [ Google Scholar ] [ CrossRef ]
  • Shaw, S.; Rowland, Z.; Machova, V. Internet of Things smart devices sustainable industrial big data and artificial intelligence-based decision-making algorithms in cyber-physical system-based manufacturing. Econ. Manag. Financ. Mark. 2021 , 16 , 106–116. [ Google Scholar ]
  • Bandaragoda, T.; Adikari, A.; Nawaratne, R.; Nallaperuma, D.; Luhach, A.K.; Kempitiya, T.; Nguyen, S.; Alahakoon, D.; De Silva, D.; Chilamkurti, N. Artificial intelligence based commuter behaviour profiling framework using Internet of Things for real-time decision-making. Neural Comput. Appl. 2020 , 32 , 16057–16071. [ Google Scholar ] [ CrossRef ]
  • Zhang, S.; Zhu, D. Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities. Comput. Netw. 2020 , 183 , 107556. [ Google Scholar ] [ CrossRef ]
  • Ma, X.; Gao, Z. Data-driven deep learning to design pilot and channel estimator for massive MIMO. IEEE Trans. Veh. Technol. 2020 , 69 , 5677–5682. [ Google Scholar ] [ CrossRef ]
  • Wang, C.X.; di Renzo, M.; Stańczak, S.; Wang, S.; Larsson, E.G. Artificial intelligence enabled wireless networking for 5G and beyond: Recent advances and future challenges. IEEE Wirel. Commun. 2020 , 27 , 16–23. [ Google Scholar ] [ CrossRef ]
  • Tataria, H.; Shafi, M.; Molisch, A.F.; Dohler, M.; Sjoland, H.; Tufvesson, F. 6G wireless systems: Vision, requirements, challenges, insights, and opportunities. Proc. IEEE 2021 , 109 , 1166–1199. [ Google Scholar ] [ CrossRef ]
  • Rekkas, V.P.; Sotiroudis, S.; Sarigiannidis, P.; Wan, S.; Karagiannidis, G.K.; Goudos, S.K. Machine learning in beyond 5g/6g networks—State-of-the-art and future trends. Electronics 2021 , 10 , 2786. [ Google Scholar ] [ CrossRef ]
  • Kato, N.; Mao, B.; Tang, F.; Kawamoto, Y.; Liu, J. Ten challenges in advancing machine learning technologies toward 6G. IEEE Wirel. Commun. 2020 , 27 , 96–103. [ Google Scholar ] [ CrossRef ]
  • Khan, N.A.; Schmid, S. AI-RAN in 6G Networks: State-of-the-Art and Challenges. IEEE Open J. Commun. Soc. 2023 , 5 , 294–311. [ Google Scholar ] [ CrossRef ]
  • Letaief, K.B.; Chen, W.; Shi, Y.; Zhang, J.; Zhang, Y.-J.A. The roadmap to 6G: AI empowered wireless networks. IEEE Commun. Mag. 2019 , 57 , 84–90. [ Google Scholar ] [ CrossRef ]
  • Narottama, B.; Mohamed, Z.; Aïssa, S. Quantum Machine Learning for Next-G Wireless Communications: Fundamentals and the Path Ahead. IEEE Open J. Commun. Soc. 2023 , 4 , 2204–2224. [ Google Scholar ] [ CrossRef ]
  • Shvetsov, A.V.; Alsamhi, S.H.; Hawbani, A.; Kumar, S.; Srivastava, S.; Agarwal, S.; Rajput, N.S.; Alammari, A.A.; Nashwan, F.M.A. Federated Learning Meets Intelligence Reflection Surface in Drones for Enabling 6G Networks: Challenges and Opportunities. IEEE Access 2023 , 11 , 130860–130887. [ Google Scholar ] [ CrossRef ]
  • Klaine, P.V.; Nadas, J.P.B.; Souza, R.D.; Imran, M.A. Distributed drone base station positioning for emergency cellular networks using reinforcement learning. Cogn. Comput. 2018 , 10 , 790–804. [ Google Scholar ] [ CrossRef ]
  • Gao, H.M.; Zhong, C.; Li, G.Y.; Zhang, Z. An attention-aided deep learning framework for massive MIMO channel estimation. IEEE Trans. Wirel. Commun. 2021 , 21 , 1823–1835. [ Google Scholar ] [ CrossRef ]
  • O’Shea, T.; Hoydis, J. An Introduction to Deep Learning for the Physical Layer. IEEE Trans. Cogn. Commun. Netw. 2017 , 3 , 563–575. [ Google Scholar ] [ CrossRef ]
  • Xu, W.; Yang, Z.; Ng, D.W.K.; Levorato, M.; Eldar, Y.C.; Debbah, M. Edge learning for B5G networks with distributed signal processing: Semantic communication, edge computing, and wireless sensing. IEEE J. Sel. Top. Signal Process. 2023 , 17 , 9–39. [ Google Scholar ] [ CrossRef ]
  • Schiller, J.H.; Wesley, A. Mobile Communications , 2nd ed.; Addison-Wesley: Boston, MA, USA, 2003. [ Google Scholar ]
  • Kairouz, P.; McMahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Bhagoji, A.N.; Bonawitz, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 2021 , 14 , 1–210. [ Google Scholar ] [ CrossRef ]
  • Zhang, C.; Xie, Y.; Bai, H.; Yu, B.; Li, W.; Gao, Y. A survey on federated learning. Knowl. -Based Syst. 2021 , 216 , 106775. [ Google Scholar ] [ CrossRef ]
  • Yang, C.; He, Z.; Peng, Y.; Wang, Y.; Yang, J. Deep learning aided method for automatic modulation recognition. IEEE Access 2019 , 7 , 109063–109068. [ Google Scholar ] [ CrossRef ]
  • Vinayakumar, R.; Soman, K.; Poornachandran, P. Applying deep learning approaches for network traffic prediction. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Manipal, India, 13–16 September 2017; pp. 2353–2358. [ Google Scholar ]
  • Zhang, H.; Zhang, H.; Long, K.; Karagiannidis, G.K. Deep learning based radio resource management in NOMA networks: User association, subchannel and power allocation. IEEE Trans. Netw. Sci. Eng. 2020 , 7 , 2406–2415. [ Google Scholar ] [ CrossRef ]
  • Zhao, Z.; Karimzadeh, M.; Pacheco, L.; Santos, H.; Rosário, D.; Braun, T.; Cerqueira, E. Mobility management with transferable reinforcement learning trajectory prediction. IEEE Trans. Netw. Serv. Manag. 2020 , 17 , 2102–2116. [ Google Scholar ] [ CrossRef ]
  • Ozpoyraz, B.; Dogukan, A.T.; Gevez, Y.; Altun, U.; Basar, E. Deep Learning-Aided 6G Wireless Networks: A Comprehensive Survey of Revolutionary PHY Architectures. IEEE Open J. Commun. Soc. 2022 , 3 , 1749–1809. [ Google Scholar ] [ CrossRef ]
  • Samuel, N.; Diskin, T.; Ami, W. Deep MIMO detection. In Proceedings of the IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2014; pp. 1–5. [ Google Scholar ]
  • Samuel, N.; Diskin, T.; Wiesel, A. Learning to detect. IEEE Trans. Signal Process. 2019 , 67 , 2554–2564. [ Google Scholar ] [ CrossRef ]
  • He, H.; Wen, C.-K.; Jin, S.; Li, G.Y. A model-driven deep learning network for MIMO detection. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, CA, USA, 26–28 November 2018; pp. 584–588. [ Google Scholar ]
  • Al-Baidhani, A.; Fan, H.H. Learning for detection: A deep learning wireless communication receiver over rayleigh fading channels. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; pp. 6–10. [ Google Scholar ]
  • Shamasundar, B.; Chockalingam, A. A DNN architecture for the detection of generalized spatial modulation Signalsieee. Commun. Lett. 2020 , 24 , 2770–2774. [ Google Scholar ]
  • Albinsaid, H.; Singh, K.; Biswas, S.; Li, C.-P.; Alouini, M.-S. Block deep neural network-based signal detector for generalized spatial modulation. IEEE Commun. Lett. 2020 , 24 , 2775–2779. [ Google Scholar ] [ CrossRef ]
  • Xiang, L.; Liu, Y.; Van Luong, T.; Maunder, R.G.; Yang, L.-L.; Hanzo, L. Deep-learning-aided joint channel estimation and data detection for spatial modulation. IEEE Access 2020 , 8 , 191910–191919. [ Google Scholar ] [ CrossRef ]
  • He, H.; Wen, C.-K.; Jin, S.; Li, G.Y. Model-driven deep learning for MIMO detection. IEEE Trans. Signal Process. 2020 , 68 , 1702–1715. [ Google Scholar ] [ CrossRef ]
  • Wang, X.; Hua, H.; Xu, Y. Pilot-assisted channel estimation and signal detection in uplink multi-user MIMO systems with deep learning. IEEE Access 2020 , 8 , 44936–44946. [ Google Scholar ] [ CrossRef ]
  • Sohrabi, F.; Cheng, H.V.; Yu, W. Robust symbol-level precoding via autoencoder-based deep learning. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Virtual, 4–9 May 2020; pp. 8951–8955. [ Google Scholar ]
  • Bo, Z.; Liu, R.; Li, M.; Liu, Q. Deep learning based efficient symbol-level precoding design for MU-MISO systems. IEEE Trans. Veh. Technol. 2021 , 70 , 8309–8313. [ Google Scholar ] [ CrossRef ]
  • Sheraz, M.; Ahmed, M.; Hou, X.; Li, Y.; Jin, D.; Han, Z.; Jiang, T. Artificial Intelligence for Wireless Caching: Schemes, Performance, and Challenges. IEEE Commun. Surv. Tutor. 2020 , 23 , 631–661. [ Google Scholar ] [ CrossRef ]
  • Huang, X.; Zhang, K.; Wu, F.; Leng, S. Collaborative Machine Learning for Energy-Efficient Edge Networks in 6G. IEEE Netw. 2021 , 35 , 12–19. [ Google Scholar ] [ CrossRef ]
  • Navarathna, P.J.; Malagi, V.P. Artificial intelligence in smart city analysis. In Proceedings of the 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 13–14 December 2018; pp. 44–47. [ Google Scholar ]
  • Sharma, V.; Kumar, S. Role of artificial intelligence (AI) to enhance the security and privacy of data in smart cities. In Proceedings of the 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 12–13 May 2023; pp. 596–599. [ Google Scholar ]
  • Ilyas, M. IoT applications in smart cities. In Proceedings of the 2021 International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), Yilan, Taiwan, 10–12 December 2021; pp. 44–47. [ Google Scholar ]
  • Liu, F.; Cui, Y.; Masouros, C.; Xu, J.; Han, T.X.; Eldar, Y.C.; Buzzi, S. Integrated sensing and communications: Towards dual-functional wireless networks for 6G and beyond. IEEE J. Sel. Areas Commun. 2022 , 40 , 1728–1767. [ Google Scholar ] [ CrossRef ]
  • Liu, F.; Zheng, L.; Cui, Y.; Masouros, C.; Petropulu, A.P.; Griffiths, H.; Eldar, Y.C. Seventy Years of Radar and Communications: The road from separation to integration. IEEE Signal Process. Mag. 2023 , 40 , 106–121. [ Google Scholar ] [ CrossRef ]
  • Cui, Y.; Liu, F.; Jing, X.; Mu, J. Integrating sensing and communications for ubiquitous IoT: Applications, trends, and challenges. IEEE Netw. 2021 , 35 , 158–167. [ Google Scholar ] [ CrossRef ]
  • Chiriyath, A.R.; Paul, B.; Bliss, D.W. Radar-communications convergence: Coexistence cooperation and co-Des. Trans. Cogn. Commun. Netw. 2017 , 3 , 1–12. [ Google Scholar ] [ CrossRef ]
  • Zhang, J.A.; Liu, F.; Masouros, C.; Heath, R.W.; Feng, Z.; Zheng, L.; Petropulu, A. An overview of signal processing techniques for joint communication and radar sensing. IEEE J. Sel. Top. Signal Process. 2021 , 15 , 1295–1315. [ Google Scholar ] [ CrossRef ]
  • Mishra, K.V.; Shankar, M.B.; Koivunen, V.; Ottersten, B.; Vorobyov, S.A. Toward millimeter-wave joint radar communications: A signal processing perspective. IEEE Signal Process. Mag. 2019 , 36 , 100–114. [ Google Scholar ] [ CrossRef ]
  • Althobaiti, T.; Khalil, R.A.; Saeed, N. Robust ISAC Localization in Smart Cities: A Hybrid Network Approach for NLOS Challenges with Uncertain Parameters. J. Sens. Actuator Netw. 2024 , 13 , 2. [ Google Scholar ] [ CrossRef ]
  • Khalil, R.A.; Saeed, N.; Almutiry, M. UAVs-assisted passive source localization using robust TDOA ranging for search and rescue. ICT Express 2022 , 9 , 677–682. [ Google Scholar ] [ CrossRef ]
  • Huang, S.; Wang, B.; Zhao, Y.; Luan, M. Near-field RSS-based localization algorithms using reconfigurable intelligent surface. IEEE Sens. J. 2022 , 22 , 3493–3505. [ Google Scholar ] [ CrossRef ]
  • Liu, J.; Liu, H.; Chen, Y.; Wang, Y.; Wang, C. Wireless sensing for human activity: A survey. IEEE Commun. Surv. Tutor. 2020 , 22 , 1629–1645. [ Google Scholar ] [ CrossRef ]
  • Chu, N.H.; Nguyen, D.N.; Hoang, D.T.; Pham, Q.-V.; Hwang, W.-J.; Dutkiewicz, E. Ai-empowered joint communication and radar systems with adaptive waveform for autonomous vehicles. arXiv 2022 , arXiv:2202.11508. [ Google Scholar ]
  • Demirhan, U.; Alkhateeb, A. Integrated sensing and communication for 6g: Ten key machine learning roles. IEEE Commun. Mag. 2023 , 61 , 113–119. [ Google Scholar ] [ CrossRef ]
  • Lu, S.; Liu, F.; Li, Y.; Zhang, K.; Huang, H.; Zou, J.; Li, X.; Dong, Y.; Dong, F.; Zhu, J.; et al. Integrated Sensing and Communications: Recent Advances and Ten Open Challenges. IEEE Internet Things J. 2024 , 11 , 19094–19120. [ Google Scholar ] [ CrossRef ]
  • Saeed, N.; Al-Naffouri, T.Y.; Alouini, M.-S. Around the world of IoT/climate monitoring using internet of X-things. IEEE Internet Things Mag. 2020 , 3 , 82–83. [ Google Scholar ] [ CrossRef ]
  • Gurgen, L.; Gunalp, O.; Benazzouz, Y.; Gallissot, M. Self-aware cyber-physical systems and applications in smart buildings and cities. In Proceedings of the 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 18–22 March 2013; pp. 1149–1154. [ Google Scholar ]
  • Kato, T.; Fukumoto, N.; Sasaki, C.; Tagami, A.; Nakao, A. Challenges of CPS/IoT Network Architecture in 6G Era. IEEE Access 2024 , 12 , 62804–62817. [ Google Scholar ] [ CrossRef ]
  • Guo, F.; Yu, F.R.; Zhang, H.; Li, X.; Ji, H.; Leung, V.C.M. Enabling Massive IoT Toward 6G: A Comprehensive Survey. IEEE Internet Things J. 2021 , 8 , 11891–11915. [ Google Scholar ] [ CrossRef ]
  • Mahmood, N.H.; Berardinelli, G.; Khatib, E.J.; Hashemi, R.; Morais de Lima, C.; Latva-aho, M. A Functional Architecture for 6G Special Purpose Industrial IoT Networks. IEEE Trans. Ind. Inform. 2022 , 19 , 2530–2540. [ Google Scholar ] [ CrossRef ]
  • Eldrandaly, K.A.; Abdel-Basset, M.; Shawky, L.A. Internet of Spatial Things: A New Reference Model with Insight Analysis. IEEE Access 2019 , 7 , 19653–19669. [ Google Scholar ] [ CrossRef ]
  • Banafaa, M.; Shayea, I.; Din, J.; Azmi, M.H.; Alashbi, A.; Daradkeh, Y.I.; Alhammadi, A. 6G Mobile Communication Technology: Requirements, Targets, Applications, Challenges, Advantages, and Opportunities. Alex. Eng. J. 2023 , 64 , 245–274. [ Google Scholar ] [ CrossRef ]
  • Gupta, R.; Reebadiya, D.; Tanwar, S. 6G-enabled edge intelligence for ultra -reliable low latency applications: Vision and mission. Comput. Stand. Interfaces 2021 , 77 , 103521. [ Google Scholar ] [ CrossRef ]
  • Alwis, C.D.; Kalla, A.; Pham, Q.-V.; Kumar, P.; Dev, K.; Hwang, W.-J.; Liyanage, M. Survey on 6G frontiers: Trends, applications, requirements, technologies and future research. IEEE Open J. Commun. Soc. 2021 , 2 , 836–886. [ Google Scholar ] [ CrossRef ]
  • Kua, J.; Loke, S.W.; Arora, C.; Fernando, N.; Ranaweera, C. Internet of Things in Space: A Review of Opportunities and Challenges from Satellite-Aided Computing to Digitally-Enhanced Space Living. Sensors 2021 , 21 , 8117. [ Google Scholar ] [ CrossRef ]
  • Alabdulatif, A.; Thilakarathne, N.N.; Lawal, Z.K.; Fahim, K.E.; Zakari, R.Y. Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges. Sensors 2023 , 23 , 2807. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Ullah, Z.; Naeem, M.; Coronato, A.; Ribino, P.; De Pietro, G. Applications in Sustainable Smart Cities. Sustain. Cities Soc. 2023 , 97 , 104697. [ Google Scholar ] [ CrossRef ]
  • Khan, A.H.; Hassan, N.U.; Yuen, C.; Zhao, J.; Niyato, D.; Zhang, Y.; Poor, H.V. Blockchain and 6G: The Future of Secure and Ubiquitous Communication. IEEE Wirel. Commun. 2021 , 29 , 194–201. [ Google Scholar ] [ CrossRef ]
  • Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.I.; Zhao, J. Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 2019 , 68 , 2906–2920. [ Google Scholar ] [ CrossRef ]
  • Kim, M.; Oh, I.; Yim, K.; Sahlabadi, M.; Shukur, Z. Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies. IEEE Access 2023 , 12 , 33972–34001. [ Google Scholar ] [ CrossRef ]
  • Hassan, N.U.; Yuen, C.; Niyato, D. Blockchain technologies for smart energy systems: Fundamentals, challenges, and solutions. IEEE Ind. Electron. Mag. 2019 , 13 , 106–118. [ Google Scholar ] [ CrossRef ]
  • Leng, J.; Ye, S.; Zhou, M.; Zhao, J.L.; Liu, Q.; Guo, W.; Cao, W.; Fu, L. Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey. IEEE Trans. Syst. Man Cybern. Syst. 2021 , 51 , 237–252. [ Google Scholar ] [ CrossRef ]
  • Balandina, E.; Balandin, S.; Mouromtsev, D. IoT use cases in healthcare and tourism. In Proceedings of the 2015 IEEE 17th Conference on Business Informatics (CBI), Lisbon, Portugal, 13–16 July 2015; pp. 37–44. [ Google Scholar ]
  • Chaudjary, S.; Kakkar, R.; Gupta, R.; Tanwar, S.; Agrawal, S.; Sharma, R. Blockchain and federated learning-based security solutions for telesurgery system: A comprehensive review. Turk. J. Electr. Eng. Comput. Sci. 2022 , 30 , 2446–2488. [ Google Scholar ] [ CrossRef ]
  • Bhushan, B.; Khamparia, A.; Sagayam, K.M.; Sharma, S.K.; Ahad, M.A.; Debnath, N.C. Blockchain for smart cities: A review of architectures integration trends and future research directions. Sustain. Cities Soc. 2020 , 61 , 102360. [ Google Scholar ] [ CrossRef ]
  • Chen, Y.; Qiu, Y.; Tang, Z.; Long, S.; Zhao, L.; Tang, Z. Exploring the Synergy of Blockchain, IoT, and Edge Computing in Smart Traffic Management across Urban Landscapes. J. Grid Comput. 2024 , 22 , 45. [ Google Scholar ] [ CrossRef ]
  • Ahmad, A.Y.A.; Verma, N.; Sarhan, N.M.; Awwad, E.M.; Arora, A.; Nyangaresi, V.O. An IoT and Blockchain-Based Secure and Transparent Supply Chain Management Framework in Smart Cities Using Optimal Queue Model. IEEE Access 2024 , 12 , 51752–51771. [ Google Scholar ] [ CrossRef ]
  • Sun, X.; Dou, H.; Chen, S.; Zhao, H. A novel block-chain based secure cross-domain interaction approach for intelligent transportation systems. Phys. Commun. 2024 , 63 , 102223. [ Google Scholar ] [ CrossRef ]
  • Raja, G.; Senthivel, S.G.; Balaganesh, S.; Rajakumar, B.R.; Ravichandran, V.; Guizani, M. MLB-IoD: Multi Layered Blockchain Assisted 6G Internet of Drones Ecosystem. IEEE Trans. Veh. Technol. 2023 , 72 , 2511–2520. [ Google Scholar ] [ CrossRef ]
  • Qian, K.; Liu, Y.; Shu, C.; Sun, Y.; Wang, K. Fine-Grained Benchmarking and Targeted Optimization: Enabling Green IoT-Oriented Blockchain in the 6G Era. IEEE Trans. Green Commun. Netw. 2022 , 7 , 1036–1051. [ Google Scholar ] [ CrossRef ]
  • Shah, K.; Chadotra, S.; Tanwar, S.; Gupta, R.; Kumar, N. Blockchain for IoV in 6G environment: Review solutions and challenges. Clust. Comput. 2022 , 25 , 1927–1955. [ Google Scholar ] [ CrossRef ]
  • Kaur, A.; Singh, G.; Kukreja, V.; Sharma, S.; Singh, S.; Yoon, B. Adaptation of IoT with Blockchain in Food Supply Chain Management: An Analysis-Based Review in Development, Benefits and Potential Applications. Sensors 2022 , 22 , 8174. [ Google Scholar ] [ CrossRef ]
  • Akyildiz, I.F.; Kak, A.; Nie, S. 6G and beyond: The future of wireless communications systems. IEEE Access 2020 , 8 , 133995–134030. [ Google Scholar ] [ CrossRef ]
  • Bariah, L.; Mohjazi, L.; Muhaidat, S.; Sofotasios, P.C.; Kurt, G.K.; Yanikomeroglu, H.; Dobre, O.A. A prospective look: Key enabling technologies applications and open research topics in 6G networks. arXiv 2020 , arXiv:2004.06049. [ Google Scholar ] [ CrossRef ]
  • Jiang, W.; Zhou, Q.; He, J.; Habibi, M.A.; Melnyk, S.; El-Absi, M.; Han, B.; Di Renzo, M.; Schotten, H.D.; Luo, F.-L.; et al. Terahertz Communications and Sensing for 6G and Beyond: A Comprehensive View. TechRxiv 2023 . [ Google Scholar ] [ CrossRef ]
  • Elayan, H.; Amin, O.; Shihada, B.; Shubair, R.M.; Alouini, M.-S. Terahertz band: The last piece of RF spectrum puzzle for communication systems. IEEE Open J. Commun. Soc. 2019 , 1 , 1–32. [ Google Scholar ] [ CrossRef ]
  • Saad, W.; Bennis, M.; Chen, M. A vision of 6G wireless systems: Applications trends technologies and open research problems. IEEE Netw. 2020 , 34 , 134–142. [ Google Scholar ] [ CrossRef ]
  • Lin, C.; Li, G.Y. Terahertz communications: An array-of-subarrays solution. IEEE Commun. Mag. 2016 , 54 , 124–131. [ Google Scholar ] [ CrossRef ]
  • Pan, C.; Ren, H.; Wang, K.; Kolb, J.F.; Elkashlan, M.; Chen, M.; Di Renzo, M.; Hao, Y.; Wang, J.; Swindlehurst, A.L.; et al. Reconfigurable intelligent surfaces for 6G systems: Principles applications and research directions. arXiv 2020 , arXiv:2011.04300. [ Google Scholar ] [ CrossRef ]
  • Basharat, S.; Hassan, S.A.; Pervaiz, H.; Mahmood, A.; Ding, Z.; Gidlund, M. Reconfigurable Intelligent Surfaces: Potentials, Applications, and Challenges for 6G Wireless Networks. IEEE Wirel. Commun. 2021 , 28 , 184–191. [ Google Scholar ] [ CrossRef ]
  • Rappaport, T.S.; Xing, Y.; Kanhere, O.; Ju, S.; Madanayake, A.; Mandal, S.; Trichopoulos, G.C. Wireless communications andapplications above 100 GHz: Opportunities and challenges for 6G andbeyond. IEEE Access 2019 , 7 , 78729–78757. [ Google Scholar ] [ CrossRef ]
  • Lemic, F.; Abadal, S.; Tavernier, W.; Stroobant, P.; Colle, D.; Alarcón, E.; Marquez-Barja, J.M.; Famaey, J. Survey on terahertz nanocommunication and networking: A top-down perspective. IEEE J. Sel. Areas Commun. 2021 , 39 , 1506–1543. [ Google Scholar ] [ CrossRef ]
  • Akyildiz, I.F.; Jornet, J.M. The Internet of nano-things. IEEE Wirel. Commun. 2010 , 17 , 58–63. [ Google Scholar ] [ CrossRef ]
  • Guan, K.; He, D.; Ai, B.; Chen, Y.; Han, C.; Peng, B.; Zhong, Z.; Kuerner, T. Channel Characterization and Capacity Analysis for THz Communication Enabled Smart Rail Mobility. IEEE Trans. Veh. Technol. 2021 , 70 , 4065–4080. [ Google Scholar ] [ CrossRef ]
  • Gezimati, M.; Singh, G. Terahertz Imaging and Sensing for Healthcare: Current Status and Future Perspectives. IEEE Access 2023 , 11 , 18590–18619. [ Google Scholar ] [ CrossRef ]
  • Bandyopadhyay, A.; Sengupta, A. A review of the concept applications and implementation issues of terahertz spectral imaging technique. IETE Tech. Rev. 2020 , 39 , 471–489. [ Google Scholar ] [ CrossRef ]
  • Park, H.; Son, J.-H. Machine learning techniques for thz imaging and time-domain spectroscopy. Sensors 2021 , 21 , 1186. [ Google Scholar ] [ CrossRef ]
  • Wang, J.; Wang, C.-X.; Huang, J.; Chen, Y. 6G THz Propagation Channel Characteristics and Modeling: Recent Developments and Future Challenges. IEEE Commun. Mag. 2024 , 62 , 56–62. [ Google Scholar ] [ CrossRef ]
  • Song, H.-J.; Lee, N. Terahertz Communications: Challenges in the Next Decade. IEEE Trans. Terahertz Sci. Technol. 2021 , 12 , 105–117. [ Google Scholar ] [ CrossRef ]
  • Nawaz, S.J.; Sharma, S.K.; Wyne, S.; Patwary, M.N.; Asaduzzaman, M. Quantum machine learning for 6G communication networks: State-of-the-art and vision for the future. IEEE Access 2019 , 7 , 46317–46350. [ Google Scholar ] [ CrossRef ]
  • Botsinis, P.; Alanis, D.; Babar, Z.; Nguyen, H.V.; Chandra, D.; Ng, S.X.; Hanzo, L. Quantum search algorithms for wireless communications. IEEE Commun. Surv. Tutor. 2018 , 21 , 1209–1242. [ Google Scholar ] [ CrossRef ]
  • Tarantino, S.; Da Lio, B.; Cozzolino, D.; Bacco, D. Feasibility of quantum communications in aquatic scenarios. Optik 2020 , 216 , 164639. [ Google Scholar ] [ CrossRef ]
  • Gyongyosi, L.; Imre, S.; Nguyen, H.V. A survey on quantum channel capacities. IEEE Commun. Surv. Tutor. 2018 , 20 , 1149–1205. [ Google Scholar ] [ CrossRef ]
  • Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 1993 , 70 , 1895–1899. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Sharma, V.; Banerjee, S. Analysis of quantum key distribution based satellite communication. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 11–12 July 2018; pp. 1–5. [ Google Scholar ]
  • Inoue, K. Quantum key distribution technologies. IEEE J. Sel. Top. Quantum Electron. 2006 , 12 , 888–896. [ Google Scholar ] [ CrossRef ]
  • Bennett, C.H.; Wiesner, S.J. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 1992 , 69 , 2881–2884. [ Google Scholar ] [ CrossRef ]
  • Rozenman, G.G.; Kundu, N.K.; Liu, R.; Zhang, L.; Maslennikov, A.; Reches, Y.; Youm, H.Y. The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quantum Commun. 2023 , 4 , 147–166. [ Google Scholar ] [ CrossRef ]
  • Duong, T.Q.; Nguyen, L.D.; Narottama, B.; Ansere, J.A.; Huynh, D.V.; Shin, H. Quantum-Inspired Real-Time Optimization for 6G Networks: Opportunities, Challenges, and the Road Ahead. IEEE Open J. Commun. Soc. 2022 , 3 , 1347–1359. [ Google Scholar ] [ CrossRef ]
  • Kim, M.; Venturelli, D.; Jamieson, K. Leveraging quantum annealing for large MIMO processing in centralized radio access networks. In Proceedings of the ACM Special Interest Group on Data Communication, Beijing, China, 19–23 August 2019; pp. 241–255. [ Google Scholar ]
  • Singh, A.K.; Jamieson, K.; McMahon, P.L.; Venturelli, D. Ising machines’ dynamics and regularization for near-optimal MIMO detection. IEEE Trans. Wirel. Commun. 2022 , 21 , 11080–11094. [ Google Scholar ] [ CrossRef ]
  • Hurvitz, I.; Karnieli, A.; Arie, A. Frequency-domain engineering of bright squeezed vacuum for continuous-variable quantum information. Opt. Express 2023 , 31 , 20387–20397. [ Google Scholar ] [ CrossRef ]
  • Wang, C.; Rahman, A. Quantum-enabled 6G wireless networks: Opportunities and challenges. IEEE Wirel. Commun. 2022 , 29 , 58–69. [ Google Scholar ] [ CrossRef ]
  • Edwards, M.; Mashatan, A.; Ghose, S. A review of quantum and hybrid quantum/classical blockchain. Protoc. Inf. Process. 2020 , 19 , 184. [ Google Scholar ] [ CrossRef ]
  • Fernandez-Carames, T.M.; Fraga-Lamas, P. Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 2020 , 8 , 21091–21116. [ Google Scholar ] [ CrossRef ]
  • Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982 , 299 , 802–803. [ Google Scholar ] [ CrossRef ]
  • Bennett, C.H.; Shor, P.W.; Smolin, J.A.; Thapliyal, A.V. Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem. IEEE Trans. Inf. Theory 2002 , 48 , 2637–2655. [ Google Scholar ] [ CrossRef ]
  • Devetak, I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 2005 , 51 , 44–55. [ Google Scholar ] [ CrossRef ]
  • Wang, D.; Ohnishi, K.; Xu, W. Multimodal haptic display for virtual reality: A survey. IEEE Trans. Ind. Electron. 2019 , 67 , 610–623. [ Google Scholar ] [ CrossRef ]
  • Microsoft HoloLens 2. Available online: https://www.microsoft.com/en-us/hololens/ (accessed on 27 July 2024).
  • Clemm, A.; Vega, M.T.; Ravuri, H.K.; Wauters, T.; De Turck, F. Toward truly immersive holographic-type communication: Challenges and solutions. IEEE Commun. Mag. 2020 , 58 , 93–99. [ Google Scholar ] [ CrossRef ]
  • Strinati, E.C.; Barbarossa, S.; Gonzalez-Jimenez, J.L.; Ktenas, D.; Cassiau, N.; Maret, L.; Dehos, C. 6G: The next frontier: From holographic messaging to artificial intelligence using subterahertz and visible light communication. IEEE Veh. Technol. Mag. 2019 , 14 , 42–50. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Kumar, S.; Kaushik, A.; Kumar, A.; Saini, J. Real time estimation and suppression of hand tremor for surgical robotic applications. Microsyst. Technol. 2020 , 28 , 305–311. [ Google Scholar ] [ CrossRef ]
  • Diana, M.; Marescaux, J. Robotic surgery. J. Br. Surg. 2015 , 102 , e15–e28. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Liu, X.; Kang, S.; Plishker, W.; Zaki, G.; Kane, T.D.; Shekhar, R. Laparoscopic stereoscopic augmented reality: Toward a clinically viable electromagnetic tracking solution. J. Med. Imaging 2016 , 3 , 045001. [ Google Scholar ] [ CrossRef ]
  • Siemonsma, S.; Bell, T. HoloKinect: Holographic 3D video conferencing. Sensors 2022 , 22 , 8118. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Bastug, E.; Bennis, M.; Medard, M.; Debbah, M. Toward interconnected virtual reality: Opportunities, challenges, and enablers. IEEE Commun. Mag. 2017 , 55 , 110–117. [ Google Scholar ] [ CrossRef ]
  • Suzuki, S.-N.; Kanematsu, H.; Barry, D.M.; Ogawa, N.; Yajima, K.; Nakahira, K.T.; Shirai, T.; Kawaguchi, M.; Kobayashi, T.; Yoshitake, M. Virtual Experiments in metaverse and their applications to collaborative projects: The framework and its significance. Procedia Comput. Sci. 2020 , 176 , 2125–2132. [ Google Scholar ] [ CrossRef ]
  • Pathak, P.H.; Feng, X.; Hu, P.; Mohapatra, P. Visible light communication networking and sensing: A survey potential and challenges. IEEE Commun. Surv. Tutor. 2015 , 17 , 2047–2077. [ Google Scholar ] [ CrossRef ]
  • Filgueiras, H.R.D.; Lima, E.S.; Cunha, M.S.B.; Lopes, C.H.D.S.; De Souza, L.C.; Borges, R.M.; Pereira, L.A.M.; Brandao, T.H.; Andrade, T.P.V.; Alexandre, L.C.; et al. Wireless and Optical Convergent Access Technologies Toward 6G. IEEE Access 2023 , 11 , 9232–9259. [ Google Scholar ] [ CrossRef ]
  • Hussein, A.T.; Alresheedi, M.T.; Elmirghani, J.M.H. 20 Gb/s mobile indoor visible light communication system employing beam steering and computer generated holograms. J. Light. Technol. 2015 , 33 , 5242–5260. [ Google Scholar ] [ CrossRef ]
  • Chi, N.; Zhou, Y.; Wei, Y.; Hu, F. Visible light communication in 6G: Advances challenges and prospects. IEEE Veh. Technol. Mag. 2020 , 15 , 93–102. [ Google Scholar ] [ CrossRef ]
  • Katz, M.; Ahmed, I. Opportunities and challenges for visible light communications in 6G. In Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020; pp. 1–5. [ Google Scholar ]
  • Bian, R.; Tavakkolnia, I.; Haas, H. 15.73 Gb/s visible light communication with off-the-shelf leds. J. Light. Technol. 2019 , 37 , 2418–2424. [ Google Scholar ] [ CrossRef ]
  • Na, Z.; Wang, Y.; Xiong, M.; Liu, X.; Xia, J. Modeling and throughput analysis of an ADO-OFDM based relay-assisted VLC system for 5G networks. IEEE Access 2018 , 6 , 17586–17594. [ Google Scholar ] [ CrossRef ]
  • Chou, H.-H.; Tsai, C.-Y. Demonstration of micro-projection enabled short-range communications for 5G. In Proceedings of the 2016 21st OptoElectronics and Communications Conference (OECC) Held Jointly with 2016 International Conference on Photonics in Switching (PS), Niigata, Japan, 3–7 July 2016; pp. 1–3. [ Google Scholar ]
  • Grubor, J.; Randel, S.; Langer, K.-D.; Walewski, J.W. Broadband information broadcasting using LED-based interior lighting. J. Light. Technol. 2009 , 26 , 3883–3892. [ Google Scholar ] [ CrossRef ]
  • Wei, L.-Y.; Liu, Y.; Chow, C.-W.; Chen, G.-H.; Peng, C.-W.; Guo, P.-C.; Tsai, J.-F.; Yeh, C.-H. 6.915-Gbit/s white-light phosphor laser diode-based DCO-OFDM visible light communication (VLC) system with functional transmission distance. Electron. Lett. 2020 , 56 , 945–947. [ Google Scholar ] [ CrossRef ]
  • Khalighi, M.A.; Uysal, M. Survey on free space optical communication: A communication theory perspective. IEEE Commun. Surv. Tutor. 2014 , 16 , 2231–2258. [ Google Scholar ] [ CrossRef ]
  • Jahid, A.; Alsharif, M.H.; Hall, T.J. A contemporary survey on free space optical communication: Potentials technical challenges recent advances and research direction. J. Netw. Comput. Appl. 2022 , 200 , 103311. [ Google Scholar ] [ CrossRef ]
  • Liu, X. Free-space optics optimization models for building sway and atmospheric interference using variable Wavelengthieee. Trans. Commun. 2009 , 57 , 492–498. [ Google Scholar ]
  • Tzanakaki, A.; Anastasopoulos, M.; Berberana, I.; Syrivelis, D.; Flegkas, P.; Korakis, T.; Mur, D.C.; Demirkol, I.; Gutierrez, J.; Grass, E.; et al. Wireless-optical network convergence: Enabling the 5G architecture to support operational and end-user services. IEEE Commun. Mag. 2017 , 55 , 184–192. [ Google Scholar ] [ CrossRef ]
  • Chih-Lin, I.; Li, H.; Korhonen, J.; Huang, J.; Han, L. RAN revolution with NGFI (xHaul) for 5G. J. Light. Technol. 2017 , 36 , 541–550. [ Google Scholar ]
  • Matsuura, M.; Tajima, N.; Nomoto, H.; Kamiyama, D. 150-W power-over-fiber using double-clad fibers. J. Light. Technol. 2019 , 38 , 401–408. [ Google Scholar ] [ CrossRef ]
  • Ishtiaq, M.; Saeed, N.; Khan, M. Edge Computing in IoT: A 6G Perspective. arXiv 2021 , arXiv:2111.08943. [ Google Scholar ]
  • Alalewi, A.; Dayoub, I.; Cherkaoui, S. On 5G-V2X Use Cases and Enabling Technologies: A Comprehensive Survey. IEEE Access 2021 , 9 , 107710–107737. [ Google Scholar ] [ CrossRef ]
  • Saeed, N.; Almorad, H.; Dahrouj, H.; Al-Naffouri, T.Y.; Shamma, J.S.; Alouini, M.-S. Point-to-Point communication in Integrated Satellite-Aerial 6G Networks: State-of-the-art and future challenges. IEEE Open J. Commun. Soc. 2021 , 2 , 1505–1525. [ Google Scholar ] [ CrossRef ]
  • Di Renzo, M.; Zappone, A.; Debbah, M.; Alouini, M.-S.; Yuen, C.; de Rosny, J.; Tretyakov, S. Smart Radio Environments Empowered by Reconfigurable Intelligent Surfaces: How It Works, State of Research, and The Road Ahead. IEEE J. Sel. Areas Commun. 2020 , 38 , 2450–2525. [ Google Scholar ] [ CrossRef ]
  • Wu, Q.; Zhang, R. Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming. IEEE Trans. Wirel. Commun. 2019 , 18 , 5394–5409. [ Google Scholar ] [ CrossRef ]
  • Hu, J.; Zhang, H.; Di, B.; Li, L.; Bian, K.; Song, L.; Li, Y.; Han, Z.; Poor, H.V. Reconfigurable intelligent surface based RF sensing: Design, optimization, and implementation. IEEE J. Sel. Areas Commun. 2020 , 38 , 2700–2716. [ Google Scholar ] [ CrossRef ]
  • Wymeersch, H.; He, J.; Denis, B.; Clemente, A.; Juntti, M. Radio localization and mapping with reconfigurable intelligent surfaces: Challenges, opportunities, and research directions. IEEE Veh. Technol. Mag. 2020 , 15 , 52–61. [ Google Scholar ] [ CrossRef ]
  • Chen, R.; Liu, M.; Hui, Y.; Cheng, N.; Li, J. Reconfigurable Intelligent Surfaces for 6G IoT Wireless Positioning: A Contemporary Survey. IEEE Internet Things J. 2022 , 9 , 23570–23582. [ Google Scholar ] [ CrossRef ]
  • Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022 , 58 , 3717–3724. [ Google Scholar ] [ CrossRef ]
  • Xu, J.; Liu, Y.; Mu, X.; Dobre, O.A. STAR-RISs: Simultaneous transmitting and reflecting reconfigurable intelligent surfaces. IEEE Comm. Lett. 2021 , 25 , 3134–3138. [ Google Scholar ] [ CrossRef ]
  • Hu, S.; Rusek, F.; Edfors, O. Beyond massive MIMO: The potential of data transmission with large intelligent surfaces. IEEE Trans. Signal Process. 2018 , 66 , 2746–2758. [ Google Scholar ] [ CrossRef ]
  • Wu, Q.; Zhang, R. Weighted sum power maximization for intelligent reflecting surface aided SWIPT. IEEE Wirel. Commun. Lett. 2020 , 9 , 586–590. [ Google Scholar ] [ CrossRef ]
  • Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhang, M.; Wong, K.-K. Weighted sum secrecy rate maximization using intelligent reflecting surface. IEEE Trans. Commun. 2021 , 69 , 6170–6184. [ Google Scholar ] [ CrossRef ]
  • Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhen, L.; Wong, K.-K. Robust Design for Intelligent Reflecting Surface-Assisted Secrecy SWIPT Network. IEEE Trans. Wirel. Commun. 2021 , 21 , 4133–4149. [ Google Scholar ] [ CrossRef ]
  • Zhang, Z.; Dai, L. Reconfigurable Intelligent Surfaces for 6G: Nine Fundamental Issues and One Critical Problem. Tsinghua Sci. Technol. 2023 , 28 , 929–939. [ Google Scholar ] [ CrossRef ]
  • Hayajneh, A.M.; Zaidi, S.A.R.; McLernon, D.C.; Ghogho, M. Drone empowered small cellular disaster recovery networks for resilient smart cities. In Proceedings of the 2016 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops), London, UK, 27 June 2016; pp. 1–6. [ Google Scholar ]
  • Zhao, S.; Ota, K.; Dong, M. UAV base station trajectory optimization based on reinforcement learning in post-disaster search and rescue operations. arXiv 2022 , arXiv:2202.10338. [ Google Scholar ]
  • Angjo, J.; Shayea, I.; Ergen, M.; Mohamad, H.; Alhammadi, A.; Daradkeh, Y.I. Handover management of drones in future mobile networks: 6G technologies. IEEE Access 2021 , 9 , 12803–12823. [ Google Scholar ] [ CrossRef ]
  • Friderikos, V. Airborne Urban Microcells with Grasping End Effectors: A Game Changer for 6G Networks? In Proceedings of the 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, 7–10 September 2021. [ Google Scholar ] [ CrossRef ]
  • Liu, S.; Gao, Z.; Wu, Y.; Ng, D.W.K.; Gao, X.; Wong, K.; Chatzinotas, S.; Ottersten, B. LEO satellite constellations for 5G and beyond: How will they reshape vertical domains? IEEE Commun. Mag. 2021 , 59 , 30–36. [ Google Scholar ] [ CrossRef ]
  • Hadani, R.; Rakib, S.; Tsatsanis, M.; Monk, A.; Goldsmith, A.J.; Molisch, A.F.; Calderbank, R. Orthogonal time frequency space modulation. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [ Google Scholar ]
  • Tang, G.; Zhu, L. Integrated Signal Design of Communication and Navigation Based on LEO Satellite ; University of Electronic Science and Technology of China: Chengdu, China, 2022. [ Google Scholar ]
  • Zhou, C.; Wu, W.; He, H.; Yang, P.; Lyu, F.; Cheng, N.; Shen, X. Deep Reinforcement Learning for Delay-Oriented IoT Task Scheduling in SAGIN. IEEE Trans. Wirel. Commun. 2020 , 20 , 911–925. [ Google Scholar ] [ CrossRef ]
  • Mondal, S.; Al-Rubaye, S.; Tsourdos, A. Handover prediction for aircraft dual connectivity using model predictive control. IEEE Access 2021 , 9 , 44463–44475. [ Google Scholar ] [ CrossRef ]
  • Warrier, A.; Aljaburi, L.; Whitworth, H.; Al-Rubaye, S.; Tsourdos, A. Future 6G Communications Powering Vertical Handover in Non-Terrestrial Networks. IEEE Access 2024 , 12 , 33016–33034. [ Google Scholar ] [ CrossRef ]
  • Ghildiyal, Y.; Singh, R.; Alkhayyat, A.; Gehlot, A.; Malik, P.; Sharma, R.; Akram, S.V.; Alkwai, L.M. An imperative role of 6G communication with perspective of industry 4.0: Challenges and research directions, Sustainable Energy Technologies and Assessments. Sustain. Energy Technol. Assess. 2023 , 56 , 103047. [ Google Scholar ] [ CrossRef ]
  • The New High Tech Strategy Innovations for Germany. 2014. [Online]. Available online: https://ec.europa.eu/futurium/en/system/files/ged/hts_broschuere_engl_bf_1.pdf (accessed on 27 July 2024).
  • Kusiak, A. Smart manufacturing. Int. J. Prod. Res. 2018 , 56 , 508–517. [ Google Scholar ] [ CrossRef ]
  • Grau, A.; Indri, M.; Bello, L.; Sauter, T.O. Robots in industry. IEEE Ind. Electron. 2021 , 15 , 50–61. [ Google Scholar ] [ CrossRef ]
  • Aracil, C.; Aziebig, G.; Korondi, P.; Oh, S.; Tan, Z.; Ruderman, M.; He, W.; Ding, L.; Luo, H.; Yin, S.; et al. Toward smart systems. IEEE Ind. Electron. 2021 , 15 , 104–114. [ Google Scholar ] [ CrossRef ]
  • Chen, Z.; Chen, K.-C.; Dong, C.; Nie, Z. 6G Mobile Communications for Multi-Robot Smart Factory. J. ICT Stand. 2021 , 9 , 371–404. [ Google Scholar ] [ CrossRef ]
  • Han, B.; Habibi, M.A.; Richerzhagen, B.; Schindhelm, K.; Zeiger, F.; Lamberti, F.; Pratticò, F.G.; Upadhya, K.; Korovesis, C.; Belikaidis, I.-P.; et al. Digital Twins for Industry 4.0 in the 6G Era. IEEE Open J. Veh. Technol. 2023 , 4 , 820–835. [ Google Scholar ] [ CrossRef ]
  • Kuruvatti, N.P.; Habibi, M.A.; Partani, S.; Han, B.; Fellan, A.; Schotten, H.D. Empowering 6G communication systems with Digital Twin technology: A comprehensive survey of key concepts potential use cases standardization activities and future research directions. IEEE Access 2022 , 10 , 112158–112186. [ Google Scholar ] [ CrossRef ]
  • United Nations. Sustainable Development Goals. 2015. [Online]. Available online: https://www.un.org/sustainabledevelopment/ (accessed on 3 February 2023).
  • Mihalj, T.; Li, H.; Babić, D.; Lex, C.; Jeudy, M.; Zovak, G.; Babić, D.; Eichberger, A. Road Infrastructure Challenges Faced by Automated Driving: A Review. Appl. Sci. 2022 , 12 , 3477. [ Google Scholar ] [ CrossRef ]
  • Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Khyam, M.O.; He, J.; Pesch, D.; Moessner, K.; Saad, W.; Poor, H.V. 6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities. Proc. IEEE 2022 , 110 , 712–734. [ Google Scholar ] [ CrossRef ]
  • Kumar, V.; Ahmad, M.; Mishra, D.; Kumari, S.; Khan, M.K. RSEAP: RFID Based Secure and Efficient Authentication Protocol for Vehicular Cloud Computing. Veh. Commun. 2020 , 22 , 100213. [ Google Scholar ] [ CrossRef ]
  • Chen, C.H.; Lee, C.R.; Lu, W.C.H. Smart In-Car Camera System Using Mobile Cloud Computing Framework for Deep Learning. Veh. Commun. 2017 , 10 , 84–90. [ Google Scholar ] [ CrossRef ]
  • Ma, Y.; Wang, Z.; Yang, H.; Yang, L. Artificial intelligence applications in the development of autonomous vehicles: A survey. IEEE CAA J. Autom. Sin. 2020 , 7 , 315–329. [ Google Scholar ] [ CrossRef ]
  • Reddy, P.P. Driverless Car-Design of a Parallel and Self-Organizing System ; EasyChair: Manchester, UK, 2019. [ Google Scholar ]
  • Mendez, J.; Bierzynski, K.; Cuéllar, M.; Morales, D.P. Edge Intelligence: Concepts, architectures, applications and future directions. ACM Trans. Embed. Comput. Syst. TECS 2022 , 21 , 1–41. [ Google Scholar ] [ CrossRef ]
  • Rout, R.R.; Vemireddy, S.; Raul, S.K.; Somayajulu, D. Fuzzy logic-based emergency vehicle routing: An IoT system development for smart city applications. Comput. Elect. Eng. 2020 , 88 , 106839. [ Google Scholar ] [ CrossRef ]
  • Charoniti, E.; Klunder, G.; Schackmann, P.-P.; Schreuder, M.; de Souza Schwartz, R.; Spruijtenburg, D.; Stelwagen, U.; Wilmink, I. Environmental Benefits of C-V2X for 5GAA-5G Automotive. TNO, TNO Rep. TNO 2020 R11817. 2020. Available online: https://5gaa.org/content/uploads/2020/11/Environmental-Benefits-of-C-V2X.pdf (accessed on 27 July 2024).
  • Lee, G.; Guo, J.; Kim, K.J.; Orlik, P.; Ahn, H.; Di Cairano, S.; Saad, W. Edge computing for interconnected intersections in internet of vehicles. In Proceedings of the 2020 IEEE Intelligent Vehicles Symposium (IV), Las Vegas, NV, USA, 19 October–13 November 2020; pp. 480–486. [ Google Scholar ]
  • Ageing and Health. 1 October 2022. Available online: https://www.who.int/news-room/fact-sheets/detail/ageing-and-health (accessed on 27 July 2024).
  • Shah, T.; Yavari, A.; Mitra, K.; Saguna, S.; Jayaraman, P.P.; Rabhi, F.; Ranjan, R. Remote health care cyber-physical system: Quality of service (QoS) challenges and opportunities. IET Cyber-Phys. Syst. Theory Appl. 2016 , 1 , 40–48. [ Google Scholar ] [ CrossRef ]
  • Khullar, V.; Singh, H.P.; Miro, Y.; Anand, D.; Mohamed, H.G.; Gupta, D.; Kumar, N.; Goyal, N. IoT Fog-Enabled Multi-Node Centralized Ecosystem for Real Time Screening and Monitoring of Health Information. Appl. Sci. 2022 , 12 , 9845. [ Google Scholar ] [ CrossRef ]
  • Kiourti, A.; Nikita, K.S. A review of in-body biotelemetry devices: Implantables, ingestibles, and injectables. IEEE Trans. Biomed. Eng. 2017 , 64 , 1422–1430. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Abbasi, Q.H.; Ur-Rehman, M.; Qaraqe, K.; Alomainy, A. Advances in Body-CentricWireless Communication: Applications and State-of-the-Art ; no. 65; Institution of Engineering and Technology: London, UK, 2016. [ Google Scholar ]
  • Movassaghi, S.; Abolhasan, M.; Lipman, J.; Smith, D.; Jamalipour, A. Wireless Body Area Networks: A Survey. IEEE Commun. Surv. Tutor. 2014 , 16 , 1658–1686. [ Google Scholar ] [ CrossRef ]
  • Ahmed, A.; Xi, R.; Hou, M.; Shah, S.A.; Hameed, S. Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts. IEEE Access 2023 , 11 , 112891–112928. [ Google Scholar ] [ CrossRef ]
  • Lee, C.; Koo, B.-H.; Chae, C.-B.; Schober, R. The Internet of bio-nano things in blood vessels: System design and Prototypesj. Commun. Netw. 2023 , 25 , 222–231. [ Google Scholar ] [ CrossRef ]
  • Azmi, K.H.M.; Radzi, N.A.M.; Azhar, N.A.; Samidi, F.S.; Zulkifli, I.T.; Zainal, A.M. Active electric distribution network: Applications, challenges, and opportunities. IEEE Access 2022 , 10 , 134655–134689. [ Google Scholar ] [ CrossRef ]
  • Khosrojerdi, F.; Akhigbe, O.; Gagnon, S.; Ramirez, A.; Richards, G. Integrating artificial intelligence and analytics in smart grids: A systematic literature review. Int. J. Energy Sect. Manag. 2022 , 16 , 318–338. [ Google Scholar ] [ CrossRef ]
  • Abdullah, A.A.; Hassan, T.M. Smart grid (SG) properties and challenges: An overview. Discov. Energy 2022 , 2 , 8. [ Google Scholar ] [ CrossRef ]
  • Halle, P.D.; Shiyamala, S. Secure advance metering infrastructure protocol for smart grid power system enabled by the Internet of Things. Microprocess. Microsyst. 2022 , 95 , 104708. [ Google Scholar ] [ CrossRef ]
  • Goudarzi, A.; Ghayoor, F.; Waseem, M.; Fahad, S. Traore A survey on iot-enabled smart grids: Emerging, applications, challenges, and outlook. Energies 2022 , 15 , 6984. [ Google Scholar ] [ CrossRef ]
  • Mohammed, H. Alsharif, Abu Jahid, Raju Kannadasan, Mun-Kyeom Kim, Unleashing the potential of sixth generation (6G) wireless networks in smart energy grid management: A comprehensive review. Energy Rep. 2024 , 11 , 1376–1398. [ Google Scholar ] [ CrossRef ]
  • Judge, M.A.; Khan, A.; Manzoor, A.; Khattak, H.A. Overview of smart grid implementation: Frameworks, impact, performance and challenges. J. Energy Storage 2022 , 49 , 104056. [ Google Scholar ] [ CrossRef ]
  • Aggarwal, S.; Kumar, N.; Tanwar, S.; Alazab, M. A survey on energy trading in the smart grid: Taxonomy, research challenges and solutions. IEEE Access 2021 , 9 , 116231–116253. [ Google Scholar ] [ CrossRef ]
  • Arcas, G.I.; Cioara, T.; Anghel, I.; Lazea, D.; Hangan, A. Edge Offloading in Smart Grid. Smart Cities 2024 , 7 , 680–711. [ Google Scholar ] [ CrossRef ]
  • Afzal, M.; Li, J.; Amin, W.; Huang, Q.; Umer, K.; Ahmad, S.A.; Ahmad, F.; Raza, A. Role of blockchain technology in transactive energy market: A review. Sustain. Energy Technol. Assess. 2022 , 53 , 102646. [ Google Scholar ] [ CrossRef ]
  • Tariq, M.; Ali, M.; Naeem, F.; Poor, H.V. Vulnerability Assessment of 6G-Enabled Smart Grid Cyber–Physical Systems. IEEE Internet Things J. 2020 , 8 , 5468–5475. [ Google Scholar ] [ CrossRef ]
  • Gao, J.; Asamoah, K.O.; Xia, Q.; Sifah, E.B.; Amankona, O.I.; Xia, H. A Blockchain Peer-to-Peer Energy Trading System for Microgrids. IEEE Trans. Smart Grid 2023 , 14 , 3944–3960. [ Google Scholar ] [ CrossRef ]
  • Vergara, S.E.; Tchobanoglous, G. Municipal solid waste and the environment: A global perspective. Annu. Rev. Environ. Resour. 2012 , 37 , 277–309. [ Google Scholar ] [ CrossRef ]
  • Anagnostopoulos, T.; Zaslavsky, A.; Sosunova, I.; Fedchenkov, P.; Medvedev, A.; Ntalianis, K.; Skourlas, C.; Rybin, A.; Khoruznikov, S. A stochastic multi-agent system for Internet of Things-enabled waste management in smart cities. Waste Manag. Res. J. Sustain. Circ. Econ. 2018 , 36 , 1113–1121. [ Google Scholar ] [ CrossRef ]
  • Henaien, A.; Ben Elhadj, H.; Fourati, L.C. A sustainable smart IoT-based solid waste management system. Futur. Gener. Comput. Syst. 2024 , 157 , 587–602. [ Google Scholar ] [ CrossRef ]
  • Ahmed, M.M.; Hassanien, E.; Hassanien, A.E. IoT-based intelligent waste management system. Neural Comput. Appl. 2023 , 35 , 23551–23579. [ Google Scholar ] [ CrossRef ]
  • Maoliang, L.; Lin, X. Incentivizing household recycling crowds out public support for other waste management policies: A long-term quasi-experimental study. J. Environ. Manag. 2021 , 299 , 1–9. [ Google Scholar ] [ CrossRef ]
  • Belsare, K.; Singh, M.; Gandam, A.; Malik, P.K.; Agarwal, R.; Gehlot, A. An integrated approach of IoT and WSN using wavelet transform and machine learning for the solid waste image classification in smart cities. Trans. Emerg. Telecommun. Technol. 2023 , 35 , e4857. [ Google Scholar ] [ CrossRef ]
  • Bourougaa-Tria, S.; Mokhati, F.; Tria, H.; Bouziane, O. SPubBin: Smart Public Bin Based on Deep Learning Waste Classification: An IOT system for Smart Environment in Algeria. Informatica 2022 , 46 , 41. [ Google Scholar ] [ CrossRef ]
  • Mookkaiah, S.S.; Thangavelu, G.; Hebbar, R.; Haldar, N.; Singh, H. Design and development of smart Internet of Things–based solid waste management system using computer vision. Environ. Sci. Pollut. Res. 2022 , 29 , 64871–64885. [ Google Scholar ] [ CrossRef ]
  • Cao, B.; Chen, X.; Lv, Z.; Li, R.; Fan, S. Optimization of Classified Municipal Waste Collection Based on the Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 2020 , 22 , 5364–5373. [ Google Scholar ] [ CrossRef ]
  • Rahmanifar, G.; Mohammadi, M.; Sherafat, A.; Hajiaghaei-Keshteli, M.; Fusco, G.; Colombaroni, C. Heuristic approaches to address vehicle routing problem in the Iot-based waste management system. Expert Syst. Appl. 2023 , 220 , 119708. [ Google Scholar ] [ CrossRef ]
  • Kona, V.V.S.; Subramoniam, M. A smart Iot-based waste management system using vehicle shortest path routing and trashcan visiting decision making based ondeep convolutional neural network. Peer-Peer Netw. Appl. 2024 , 17 , 1051–1074. [ Google Scholar ] [ CrossRef ]
  • Salehi-Amiri, A.; Akbapour, N.; Hajiaghaei-Keshteli, M.; Gajpal, Y.; Jabbarzadeh, A. Designing an effective two-stage, sustainable, and IoT based waste management system. Renew. Sustain. Energy Rev. 2022 , 157 , 112031. [ Google Scholar ] [ CrossRef ]
  • Qi, Q.; Chen, X.; Zhong, C.; Zhang, Z. Integration of energy, computation and communication in 6g cellular internet of things. IEEE Commun. Lett. 2020 , 24 , 1333–1337. [ Google Scholar ] [ CrossRef ]
  • Tasci, R.A.; Kilinc, F.; Basar, E.; Alexandropoulos, G.C. A New RIS Architecture with a Single Power Amplifier: Energy Efficiency and Error Performance Analysis. IEEE Access 2022 , 10 , 44804–44815. [ Google Scholar ] [ CrossRef ]
  • Malik, U.M.; Javed, M.A.; Zeadally, S.; Islam, S.U. Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities. IEEE Internet Things J. 2021 , 9 , 14572–14594. [ Google Scholar ] [ CrossRef ]
  • Hossain, M.A.; Hossain, A.R.; Ansari, N. AI in 6G: Energy-Efficient Distributed Machine Learning for Multilayer Heterogeneous Networks. IEEE Netw. 2022 , 36 , 84–91. [ Google Scholar ] [ CrossRef ]
  • Shen, S.; Yu, C.; Zhang, K.; Ni, J.; Ci, S. Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective. IEEE Commun. Stand. Mag. 2021 , 5 , 80–88. [ Google Scholar ] [ CrossRef ]
  • Xie, H.; Zhan, Y.; Zeng, G.; Pan, X. LEO Mega-Constellations for 6G Global Coverage: Challenges and Opportunities. IEEE Access 2021 , 9 , 164223–164244. [ Google Scholar ] [ CrossRef ]
  • José, R.; Rodrigues, H. A Review on Key Innovation Challenges for Smart City Initiatives. Smart Cities 2024 , 7 , 141–162. [ Google Scholar ] [ CrossRef ]
  • Yoo, Y.; Boland, R.J.; Lyytinen, K.; Majchrzak, A. Organizing for innovation in the digitized world. Organ. Sci. 2012 , 23 , 1398–1408. [ Google Scholar ] [ CrossRef ]
  • Zittrain, J.L. The Generative Internet ; The Harvard Law Review Association: Cambridge, MA, USA, 2006. [ Google Scholar ]
  • Goumopoulos, C. Smart City Middleware: A Survey and a Conceptual Framework. IEEE Access 2024 , 12 , 4015–4047. [ Google Scholar ] [ CrossRef ]
  • Chang, K.-C.; Chu, K.-C.; Wang, H.-C.; Lin, Y.-C.; Pan, J.-S. Agent-based middleware framework using distributed CPS for improving resource utilization in smart city. Futur. Gener. Comput. Syst. 2020 , 108 , 445–453. [ Google Scholar ] [ CrossRef ]
  • Puiu, D.; Barnaghi, P.; Tonjes, R.; Kumper, D.; Ali, M.I.; Mileo, A.; Parreira, J.X.; Fischer, M.; Kolozali, S.; Farajidavar, N.; et al. CityPulse: Large scale data analytics framework for smart cities. IEEE Access 2016 , 4 , 1086–1108. [ Google Scholar ] [ CrossRef ]
  • Cirillo, F.; Solmaz, G.; Berz, E.L.; Bauer, M.; Cheng, B.; Kovacs, E. A standard-based open source IoT platform: FIWARE. IEEE Internet Things Mag. 2019 , 2 , 12–18. [ Google Scholar ] [ CrossRef ]
  • Pliatsios, A.; Lymperis, D.; Goumopoulos, C. S2NetM: A semantic social network of things middleware for developing smart and collaborative IoT-based solutions. Future Internet 2023 , 15 , 207. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

Parameter5G6G
Data Rate, Band~20 Gbps, sub-6 GHz, Crowded~1 TBPS, ultra-fast (THz)
ServicesLimited capability to support new communicationHolographic communication, augmented reality, immersive gaming, etc.
LatencyLow latencyUltra-low latency and high reliability
ArchitectureMassive MIMOCell-free massive MIMO, intelligent surfaces
CoverageInfrastructure-basedUbiquitous connectivity (space–air–ground–sea)
SecuritySecurity issuesBlockchain and quantum communication.
AI IntegrationPartialFull
Satellite IntegrationNoFull
Source DatabasesIEEE Xplore, Web of Science (WoS), Taylor and Francis, ASCE Library, Scopus, and Springer
Search String(“Artificial Intelligence” OR “THz” OR “ISAC” OR “Block Chain” OR “UAV”) AND (“6G”) AND (“Smart Cities”)
Time period2019–2024
Article TypeJournal, Review, Letter, Book Chapter, Short Survey, Article
Language RestrictionEnglish
Included Subject AreaComputer Science, Engineering, Energy, Business, Management and Accounting, Mathematics, Environmental Science, Decision Sciences
Excluded Subject AreaChemical Engineering, Arts and Humanities, Health Professions, Agricultural and Biological Sciences, Neuroscience, Multidisciplinary, Psychology, Pharmacology, Toxicology and Pharmaceutics, Immunology and Microbiology, Nursing, Social Sciences, Economics Econometrics and Finance, Physics and Astronomy, Materials Science, Medicine, Biochemistry, Genetics and Molecular Biology, Chemistry, Earth and Planetary Sciences
Ref.AuthorsYear of Public.Research AreaMajor Contribution
[ ]Fong, B et al.2023VehicularInvestigates technical issues regarding the design and implementation of vehicle-to-infrastructure (V2I) systems to enhance reliability in a smart city with 6G as backbone.
[ ]P Mishra et al.2023IoT, VisionProposes framework, architecture and requirements for 6G IoT network. Discusses emerging technologies for 6G concerning artificial intelligence/machine learning, sensing networks, spectrum bands, and security.
[ ]Nahid Parvaresh, Burak Kantarci,2023UAV base stationNetwork performance of UAV-BS is improved by use of proposed continuous actor-critic deep reinforcement learning method to address the 3D location optimization issue of UAV-BSs in smart cities.
[ ]Z. Yang et al.2023Edge cloud, Energy efficiencyPaper analyzes challenges in developing a low-carbon smart city in 6G-enabled smart cities. Also proposes a visual end-edge-cloud architecture (E C) that is AI-driven for attaining low carbon emission in smart cities.
[ ]N. Sehito et al.2024IRS, UAV, NOMA, Spectral efficiencyPaper introduces a new optimization scheme by utilizing IRSs in NOMA multi-UAV networks in 6G-enabled smart cities, resulting in significant performance enhancement in terms of spectral efficiency.
[ ]Prabhat Ranjan Singh et al.2023AI, Technology evolution, Smart city applicationsPaper covers evolution of network technology, AI approaches for 6G systems, importance of AI in advanced network model development in 6G-enabled smart city applications.
[ ]Murroni, M et al.2023Vision, Enabling technologiesPaper furnishes an update on the smart city arena with the use of 6G. Paper describes the role of enabling technologies and their specific employment plans.
[ ]Kamruzzaman2022IoT, Energy efficiency, Use casesPresents key technologies, their applications, and IoT technologies trends for energy-efficient 6G-enabled smart city. Also, identifies and discusses key enabling technologies.
[ ]Kim, N et al.2024Standardization and key enabling technologies Paper provides key features and recent trends in standardization of smart city concept. Paper highlights potential key technologies of 6G that can be used in various urban use cases in 6G-enabled smart cities.
[ ]Ismail, L.; Buyya, R2022AI-enabled 6G smart citiesDiscusses evolution of wireless-technology generations, AI implementation in 6G and its self-learning models in smart city applications.
[ ]Zakria Qadir et al.2023Survey, IoTEmerging 6G connectivity solutions and their applications in IoT to serve smart cities are surveyed in this paper.
[ ]Misbah Shafi et al.20246G technologiesThe framework of 6G network is presented with its key technologies that have substantial effect on the key performance indicators of a wireless communication network.
Natural Resources and EnergyMobility and TransportLiving and EnvironmentPeople and EconomyGovernment
Smart Grid.People Mobility.Pollution Control.Education and School.e-Governance.
Public Lighting.City Logistics.Public Safety.Entertainment and Culture.Transparency.
Waste Management. Health Care.Entrepreneurship and Innovation.
Water Management Public Spaces
Welfare Services.
Smart Homes.
Ref.THzAIBCQCNTN (UAV)MECRISISACHCVLC
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
This Paper
Potential 6G TechnologyBrief Description
Artificial Intelligence (AI)AI can be used to analyze, manage and optimize resources and to efficiently support 6G networks. AI can be used for tasks like efficient channel estimation, energy efficiency, modulation recognition, data caching, traffic prediction, radio resource management, mobility management, etc.
Terahertz Communication (THz)Uses frequency band 0.1 to 10 THz. Ability to attain ultra-high (up to 1 Tbps) data rates and wide bandwidth.
Blockchain (BC)A type of distributed ledger technology to ensure safety, privacy, scalability and reliability in this complex heterogeneous architecture.
Quantum Computing (QC)Based on quantum no-cloning theorem and the principle of uncertainty, absolute randomness is introduced by the use of the quantum nature of information, which provides security and enhanced channel capacity.
Non Terrestrial networks (NTN)Includes drones and satellites and is used to extend coverage footprint of terrestrial base stations, provide additional capacity in dense urban hotspots. Used in disaster recovery and remote or rural areas.
Mobile Edge Communication (MEC)By placing computing resources closer to end user, it reduces delays and latency and enhances processing speed and on-premise security
Integrated Sensing and Communication (ISAC)Optimizes the allocation of scarce resources and contributes to better decision-making processes by combining both sensing and communication tasks, which enhances efficiency.
Reconfigurable Intelligent Surfaces (RISs)A planar surface with array of passive elements whose characteristics can be altered dynamically. Used in 6G-THz to improve coverage, NLOS scenarios.
Holographic Communication (HC)HC is an application used in transmitting human-sized immersive and interactive holograms consisting of 3D videos and images that require extremely high data rates with ultra-low latency.
Visible Light Communication (VLC)VLC offers numerous advantages, such as, energy efficiency, cost-effectiveness, un-licensed spectrum, no electromagnetic interference, secure access technology, and large bandwidth.
Ref.YearApplication Domain of Smart CitiesTechnologies UsedAreas/Topics Covered
[ ]2024V2X6G,
Blockchain,
Federated learning,
Fog Computing
Comprehensive V2X security analysis.
Future research direction for privacy in XR, secure SDN, physical layer security in THz.
[ ]2024Smart Traffic ManagementEdge Computing, Blockchain, Reinforced learningTraffic optimization is achieved by decentralized integration of IoT sensors on vehicles and traffic signals and edge devices and the use of BC rules for real-time decisions.
[ ]2024Supply Chain ManagementBlockchain, IoT, Edge ComputingA Blockchain-based and IoT-enabled transparent and secure supply chain management framework is proposed for public emergency services in smart cities.
[ ]2023Intelligent Transport System (ITS)BlockchainAn ITS cross-domain data interaction framework between devices and agencies is proposed to achieve secure and efficient cross-chain communication.
[ ]2023IoTBlockchain, Big Data, AIFramework and architecture based on Blockchain, AI and Big Data.
[ ]2023Industrial Applications6G, Blockchain, IoTCase study of smart supply chain.
Benefits and challenges of BT and 6G-IoT
[ ]2023IoD (Internet of Drones)6G, BlockchainAnalysis of multilayered Blockchain-IoD novel Global Compliance System (GCoS) and Swarm Security (Sse) system
[ ]2023IoT-Blockchain efficiency6G, IoT-oriented BlockchainImproves Blockchain-IoT performance by targeted optimization to improve low power efficiency and slow ledger synchronization.
[ ]2022IoV6G, BlockchainA survey paper for BC in IoVs sharing underlying 6G technology. Explores how privacy and security issues in IoVs can be tackled using BC technology.
[ ]2022Food Supply Chain ManagementIoT, BlockchainBlockchain enables traceability of food supply from factories/fields to the customer’s table. IoT devices probe food condition.
Use CaseDescription
Remote Surgery ]. ]. ].
Holographic Teleconferencing ]. ]. ].
Immersive Gaming ].
Metaverse ].
Tech.Applications/BenefitsChallenges
AI ]. , ]. , , , ]. ]. ] ]. ]. , , , , , , , , , , , ]. ]. ]. , , ].
ISAC , ]. ]. ]. ]. ].
THz , ]. , ]. ] ]. ]. ].
BC , ]. ]. ]. ]
QC , , ]. , ]. , ]. , , ] ]. , ].
NTN , ].
MEC , ]. ].
RIS ]. ] ] and high-precision positioning [ , ]. ]
IC , , ]. , ]. ]. ].
VLC
Application (Use Case)BenefitsDevices/Tech Used
Smart RoutingAvoidance of traffic congestion.
Useful for emergency vehicles.
Traffic balancing on roads.
Reduction in emissions [ ]
Reduce delays.
IOT sensors.
Vehicle ad-hoc networks.
AI real-time routing algorithms [ ].
Cloud and edge computing for data processing and analysis.
Smart ParkingContribution to sustainability.
Optimal utilization of parking spaces.
Reduced time for drivers to search for parking spaces.
V2V and V2I communication.
Use of sensors for indicating parking status.
AI and cloud computing.
Speed HarmonizationReduces frequent need for acceleration and deceleration.
Continuous traffic flow.
Reduces emissions.
Safe travel.
AI and cloudification.
Green-light coordination.
Green DrivingReduction of fuel consumption.
Reduction of pollution near critical areas like hospitals.
Collection of pollution data by roadside sensors.
Data transfer to centralized cloud.
Traffic management decision based on AI algorithm.
On-road displays for flashing traffic management decisions.
Coordinated ManeuversSmooth traffic flow.
Emission reduction.
V2I information exchange among vehicles and RSU [ ].
Low-latency, low-delay transmission.
Advanced AI implemented at edge for delay-free decisions.
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Sharma, S.; Popli, R.; Singh, S.; Chhabra, G.; Saini, G.S.; Singh, M.; Sandhu, A.; Sharma, A.; Kumar, R. The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges. Sustainability 2024 , 16 , 7039. https://doi.org/10.3390/su16167039

Sharma S, Popli R, Singh S, Chhabra G, Saini GS, Singh M, Sandhu A, Sharma A, Kumar R. The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges. Sustainability . 2024; 16(16):7039. https://doi.org/10.3390/su16167039

Sharma, Sanjeev, Renu Popli, Sajjan Singh, Gunjan Chhabra, Gurpreet Singh Saini, Maninder Singh, Archana Sandhu, Ashutosh Sharma, and Rajeev Kumar. 2024. "The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges" Sustainability 16, no. 16: 7039. https://doi.org/10.3390/su16167039

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IMAGES

  1. (PDF) Wireless Sensor Network on 5G Network

    wireless sensor networks latest research papers

  2. (PDF) A review paper on wireless sensor network techniques in Internet

    wireless sensor networks latest research papers

  3. (PDF) Wireless Sensor Network: Topology Issues

    wireless sensor networks latest research papers

  4. (PDF) The research of an advanced wireless sensor networks for agriculture

    wireless sensor networks latest research papers

  5. Research in Wireless Sensor Networks

    wireless sensor networks latest research papers

  6. (PDF) Computational Intelligence for Wireless Sensor Networks

    wireless sensor networks latest research papers

COMMENTS

  1. A Security and Application of Wireless Sensor Network: A ...

    Wireless Sensor Networks (WSN s) have gained prominence in technology for diverse applications, such as environmental monitoring, health care, smart agriculture, and industrial automation. Comprising small, low-power sensor nodes that sense and collect data from the environment, process it locally, and communicate wirelessly with a central sink or gateway, WSN s face challenges related to ...

  2. Wireless Sensor Networks

    Wireless sensor network (WSN) deployment is an intensive field of research. In this paper, we propose a novel approach based on machine learning (ML) and metaheuristics (MH) for supporting decision-makers during the deployment process.

  3. A Hybrid Approach for Energy Consumption and Improvement in Sensor

    In this paper, we propose an improved clustering algorithm for wireless sensor networks (WSNs) that aims to increase network lifetime and efficiency. We introduce an enhanced fuzzy spider monkey optimization technique and a hidden Markov model-based clustering algorithm for selecting cluster heads. Our approach considers factors such as network cluster head energy, cluster head density, and ...

  4. Wireless sensor network security: A recent review based on state-of-the

    Abstract Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However ...

  5. Integration of artificial intelligence (AI) with sensor networks

    2. AI empowerment: Revolutionizing wireless sensor networks through intelligent identification In the realm of wireless sensor networks, the integration of artificial intelligence (AI) holds profound significance, addressing several critical challenges and unlocking transformative capabilities. One primary challenge pertains to the massive and heterogeneous data generated by wireless sensor ...

  6. Machine Learning in Wireless Sensor Networks: A Retrospective

    Wireless Sensor Networks consist of spatially dispersed autonomous sensor nodes which collect data from the environment and forward to the other gateway for processing. These network controls the dynamic environment that changes frequently with time. This effectual behavior is created or initialized by outward parameters such as temperature, sound, light, events. To adjust with such situations ...

  7. Physical‐layer security enhancement in wireless sensor networks through

    Ensuring network security is of utmost importance, especially in wireless sensor networks (WSNs), where the confidentiality of data is at risk due to eavesdropping. This paper introduces an artificial-noise-aided secure communication scheme for WSNs. This scheme comprises numerous sensor nodes, the sink, a friendly jammer, and an eavesdropper.

  8. Wireless sensor networks: a survey, categorization, main ...

    Wireless sensor networks (WSNs) have turned into a leading area of research over the course of the last few decades as they have been employed in various application domains. Since traditional approaches configure WSNs statically, their dynamic reconfiguration represents a difficult challenge. To address this challenge, clustering techniques can be integrated into WSNs. In the present paper ...

  9. 641697 PDFs

    Network to exchange information about all sorts of wireless sensor networks | Explore the latest full-text research PDFs, articles, conference papers, preprints and more on WIRELESS SENSOR NETWORK.

  10. A review paper on wireless sensor network techniques in Internet of

    Abstract In recent times, it has been witnessed that wireless systems based on IoT-based have developed rapidly in various sectors. The IoT (Internet of Things) is the network in which physical devices, equipment, sensors and other objects can communicate among themselves without human involvement. The WSN (Wireless Sensor Network) is a central component of the IoT, which has proliferated into ...

  11. Wireless Sensor Networks in the IoT: New Challenges

    Wireless sensor networks (WSNs) have been adopted as merely data producers for years in the Internet of Things (IoT). These technologies are being use in a wide range of scenarios: smart cities, smart health, industry 4.0, etc. Moreover, Iot and WSNs have opened a wide range of new developments, not only to cope with the intrinsic restrictions ...

  12. Wireless Sensor Networks

    The 19 papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on theory and technology on wireless sensor network; application on internet of things; security and privacy protection on internet of things; fog computing and wireless computing.

  13. Security and application of wireless sensor network

    Abstract. At present, wireless sensor networks are developing rapidly with the support of the Internet of things. Wireless sensor networks can deliver the information people need at any time, free from the constraints of time and space. Wireless sensor network is widely used, which lays a solid foundation for the development of Internet of things.

  14. High‐power radio frequency wireless energy transfer system

    IET Wireless Sensor Systems is an open access journal publishing influential research in the growing field of wireless sensor networks and distributed systems. Abstract Feeding electrical components without having a physical contact was always a goal in electrical engineering. ... including the latest passive and active shielding technologies ...

  15. Applications of Wireless Sensor Networks and Internet of Things

    Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review Mamoona Majid, 1 Shaista Habib, 1 Abdul Rehman Javed, 2 Muhammad Rizwan, 3 Gautam Srivastava, 4,5 Thippa Reddy Gadekallu, 6 and Jerry Chun-Wei Lin 7,* Suparna De, Academic Editor and Klaus Moessner, Academic ...

  16. Wireless Sensor Networks (WSNs)

    Over the past two decades Wireless Sensor Networks (WSNs) and their applications have been the topic of many studies. WSN is a network responsible for collecting, processing and distributing wireless data to the intended database storage center. Because these sensors are usually installed at remote sites, despite the recent advances in the WSN technology, its applications still face ...

  17. Wireless sensor networks: a survey on recent developments ...

    Moreover, we highlight a recent phenomenon in WSN research that is to explore synergy between sensor networks and other technologies and explain how this can help sensor networks achieve their full potential. This paper intends to help new researchers entering the domain of WSNs by providing a comprehensive survey on recent developments.

  18. Future Trends of Wireless Sensor Network

    This research paper has also pinpointed the various challenges and issues which are being faced in Wireless Sensor Network and the future possibilities of Wireless Sensor Network.

  19. (PDF) Research areas in Wireless Sensor Networks

    In recent times researchers have contributed greatly in areas of wireless sensor networks, improving quality of service perceived by users of these networks, mobility management's issues and more.

  20. DIWGAN‐WBSN: A novel health monitoring approach for wireless body

    The International Journal of Communication Systems is a communications journal publishing research papers on public and private communication technology systems. Summary Wireless body sensor network (WBSN) is essential for monitoring patients' health problems and offers a low-cost option for various healthcare applications.

  21. Applications of Wireless Sensor Networks: An Up-to-Date Survey

    Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. The purpose of this article is to provide an up-to-date presentation of both traditional and ...

  22. 8 Latest Thesis and Research Areas in Wireless Sensor Network (WSN

    The plethora of research and development efforts on Wireless Sensor Networks is an indication that the technology has emerged an active research area in recent times. In this paper, a review of this intelligent technology is undertaken. Its working mechanisms, merits, challenges, transmission technologies, simulating tools and applications are considered. The paper concludes with a clear ...

  23. Wireless sensor networks: Concepts, components, and challenges

    Abstract Technological advancements have led to the coupling of small, low-cost sensing devices having computing capability supported by storage and communicational abilities to form wireless sensor networks (WSN). This chapter propounds an extensive and organized introduction to the fundamental concepts directed by the inherent characteristics of sensor nodes. It covers the communication ...

  24. Research on Wireless Sensor Network Security

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes ...

  25. Wireless Sensor Network Security

    While the set of challenges insensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We proposesome of the security goal for Wireless Sensor Network.

  26. High Resolution Image Processing Based on Spatial Optical ...

    With the development of wireless sensor network (WSN) technology, the application of image processing in green landscape design has ushered in new opportunities. This paper aims to explore the application of high-resolution image processing technology based on spatial optical characteristics and wireless sensor networks in the simulation of green landscape design, so as to improve the accuracy ...

  27. Low-Cost Efficient Wireless Intelligent Sensor (LEWIS) for Research and

    In this study, the researcher developed, fabricated, and tested an efficient low-cost wireless intelligent sensor aimed at education and research, named LEWIS1. This paper describes the hardware and software architecture of the first prototype and their use, as well as the proposed new versions, LEWIS1-β and LEWIS1-γ, which simplify both ...

  28. Cisco Security Products and Solutions

    Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.

  29. Urban Green Space Planning Based on Remote Sensing Image ...

    Traditional urban green space planning methods often rely on site survey and manual mapping, which is inefficient and costly. In order to solve these problems, a new urban green space planning method is proposed based on remote sensing image enhancement technology and wireless sensing technology. In this paper, remote sensing image technology is used to obtain high-resolution urban green space ...

  30. Sustainability

    QC-assisted communications is another new research area considered to hold potential for attaining ultra-high data rates and ensuring link security in upcoming 6G. By using quantum communication in 6G wireless networks, a strong security communication system will be established. QC has the ability to detect eavesdropping .