Machine Learning For 6G Wireless Networks
Machine Learning For 6G Wireless Networks
MACHINE LEARNING
FOR 6G WIRELESS
NETWORKS
Carrying Forward Enhanced Bandwidth, Massive Access,
and Ultrareliable/Low-Latency Service
Jun Du, Chunxiao Jiang, Jian Wang, Yong Ren, and Mérouane Debbah
T
o satisfy the expected plethora of demanding ser- networks has tended to be extremely heterogeneous,
vices, the future generation of wireless networks densely deployed, and dynamic. Combined with tight
(6G) has been mandated as a revolutionary para- quality of service (QoS), such complex architecture will
digm to carry forward the capacities of enhanced result in the untenability of legacy network operation
broadband, massive access, and ultrareliable and low- routines. In response, artificial intelligence (AI), especial-
latency service in 5G wireless networks to a more power- ly machine learning (ML), is emerging as a fundamental
ful and intelligent level. Recently, the structure of 6G solution to realize fully intelligent network orchestration
and management. By learning from uncertain and dynam-
Digital Object Identifier 10.1109/MVT.2020.3019650 ic environments, AI-/ML-enabled channel estimation and
Date of current version: 25 September 2020 spectrum management will open up opportunities for
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
bringing the excellent performance of ultrabroadband different kinds of satellite Internet, consisting of a large
techniques, such as terahertz communications, into full number of satellites, were proposed and implemented in
play. Additionally, challenges brought by ultramassive recent years. For instance, the SpaceX project Starlink
access with respect to energy and security can be miti- initially planned to build a constellation of 12,000 sat-
gated by applying AI-/ML-based approaches. Moreover, ellites in low-Earth orbit, which has been expanded to
intelligent mobility management and resource allocation 42,000 recently. In addition, mobile network operators
will guarantee the ultrareliability and low latency of ser- are accelerating the dense deployment of small-cell base
vices. Concerning these issues, this article introduces stations to reduce service latency by avoiding backhaul
and surveys some state-of-the-art techniques based on transmission. Moreover, future large-scale Internet of
AI/ML and their applications in 6G to support ultrabroad- Things (IoT) systems in 6G will also bring challenges
band, ultramassive access, and ultrareliable and low- of spectrum management and massive or super access
latency services. control. Furthermore, the integration of highly dynam-
ic satellites, unmanned aerial vehicles (UAVs), and the
Motivation and Challenges Internet of Vehicles (IoV) will result in more frequent
Recently, the 5G wireless network was developed to sup- handovers, more uncertain user requirements, and
port enhanced mobile broadband (eMBB), massive more unpredictable wireless communication environ-
machine-type communications (mMTC), and ultrareli- ments than any previous generation of networks, which
able and low-latency communications (uRLLC) [1], makes it difficult to guarantee the ultrareliability and low
according to the report of the International Telecommu- latency of services.
nication Union. Benefitting from such high performance, Therefore, 6G networks are developing into more mul-
5G has opened new doors of opportunity toward emerg- tidimensional, heterogeneous, large-scale, and highly dy-
ing applications, e.g., augmented reality (AR), virtual namic systems. All of these characteristics make it urgent
reality (VR), tactile reality, mixed reality, and so on. How- to explore new techniques that are adaptive, flexible, and
ever, the new media, such as holographic communica- intelligent to bring a revolutionary leap of communica-
tions, will require much higher transmission speeds, up tions with ultrabroadband, ultramassive access support,
to terabits per second, than AR and VR. Thus, 5G is far ultrareliability, and low latency. In addition, enormous
from able to support the faster, more reliable, and larger- amounts of widely heterogeneous data generated from
scale communication requirements of these services. In 6G networks will require advanced mathematical tools
response, the investigation of future generations of wire- to extract meaningful information from these data and
less networks (6G) has been triggered, which promises then make decisions, including resource management
more powerful capacities in terms of ultrabroadband, and access control, pertaining to the proper functioning
super-massive access, ultrareliability, and low latency of 6G, which are hardly achieved by traditional network
than 5G does, as listed in Table 1 [1]. optimization techniques. In recent years, AI is emerging
To provide ubiquitous and various services, 6G net- as a fundamental paradigm to orchestrate communica-
works tend to be more comprehensive and multidimen- tion and information systems from bottom to top. For the
sional by integrating current terrestrial networks with
space-/air-based information networks and marine in-
formation networks; then, heterogeneous network re-
sources, as well as different types of users and data, will
Table 1 A comparison of key performance indexes
be also integrated, as depicted in Figure 1. According to between 4G, 5G, and 6G.
such architecture, 6G networks are conceived to be cell
4G 5G 6G
free, which means that users will move from one net-
work to another seamlessly and automatically to pursue Peak data rate 1 Gb/s 20 Gb/s $ 1 Tb/s
the most suitable and qualified communications without User-experienced 10 Mb/s 100 Mbit/s 1 Gb/s
data rate
manual management and configurations. On the con-
trary, current 5G networking technologies still mainly Spectrum 1× 3× 15 – 30×
efficiency
focus on a macro- and small-cell-based heterogeneous
architecture, which will be broken by the cell-free opera- Mobility 350 km/h 500 km/h $ 1,000 km/h
tion of 6G, and their performance will deteriorate when Latency 10 ms 1 ms # 100 μs
applied to 6G with brand new architectures. In addition, Connection density 10 5
10 6
107
how to manage and control 6G networks to realize the (devices/km2)
promising capacities of ultrabroadband, ultramassive Network energy 1× 100× 100–10,000×
access, ultrareliability, and low latency also poses great efficiency
challenges brought by increasing ultradense, heteroge- Area traffic 0.1 10 $ 1 Gb/s/m2
neous, and dynamic characteristics. Specifically, capacity Mb/s/m2 Mbit/s/m2
Cloud
Fog Gateway
Typical
Ultrareliable
Satellite Mobility Support
Space
107 Devices/km2
Airborne
Internet
Land
Maritime
Broadband
IoV
Ocean
Smart City
Underwater
Underwater
Acoustic/Optical Ultralow-Latency
Communications Computing and Communication
≤100 µ s/s
Smart city, smart home, smart Caching, traffic classification, anomaly Channel tracking/equalization/
health care, data mining/processing/ detection, throughput optimization, decoding, pathloss prediction/estimation,
prediction, dimension reduction, latency minimization, attack detection, intelligent beamforming, modulation
feature extraction, attack detection/ intelligent routing, traffic prediction/ mode selection, anti-jamming, channel
classification, caching, data offloading, control, access control, source access control, spectrum sensing/
error detection/prediction, allocation, encoding/decoding, and so on. management/allocation, physical-layer
data rate selection, and so on. security, and so on.
AI and ML Techniques
Figure 1 An illustration of AI/ML applications in 6G to support ultrabroadband, ultramassive access, and ultrareliability/low latency.
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
to help 6G networks make more optimized and adaptive estimates. In this procedure, the prior transition prob-
data-driven decisions, alleviate communication chal- abilities between system states are important to the es-
lenges, and meet requirements from emerging services. timation performance of the Bayesian filter. RL then can
In this article, we focus on the scope of applying AI and be applied to optimize the state transition probabilities
ML to networking and resource management optimiza- from the feedback of previous estimates and, hence, im-
tion, aiming to bring about significant innovation of com- prove the performance of the Bayesian filter. Some other
munications on ultrabroadband, ultramassive access, feasible algorithms and applications in channel model-
ultrareliability, and low latency. ing and estimation are summarized as follows.
■■ Supervised learning: Supervised learning can be intro-
Intelligent Ultrabroadband Transmission in 6G duced to pathloss/shadowing prediction, localization,
In the bandwidth-hungr y age, 5G networks have interference management, channel estimation, and so
exploited the spectrum bands of sub-GHz and 1–6 GHz on. The feasible algorithms and models include radial
as efficiently as possible by introducing 24–100 GHz. basis function neural networks, feed-forward neural
However, the current spectrum bands are still hardly networks, K-nearest neighbor (KNN), multilayer per-
enough to meet the increasing demands. For instance, ception, relevance vector machine, and support vector
some emerging applications, such as holography, may machine (SVM).
require a data rate of up to terabits per second [1], ■■ Unsupervised learning: Channel modeling and estima-
which is almost three orders higher than typical 5G tion problems, such as optimal modulation, interfer-
communications. In response, terahertz communica- ence mitigation, duplexing configuration, node
tions, utilizing bands in the range of 0.1–10 THz as clustering, and multipath tracking, can be solved by
well as 140 -, 220 -, and 340 - GHz frequencies, are applying unsupervised learning algorithms, which
expected to support a data rate of up to terabits per include K-means, clustering algorithms, fuzzy C-means,
second [2]. To achieve such capacity-approaching per- and so on.
formance, accurate information of time-varying chan- ■■ DL: DL can be implemented for channel feature
nels is especially important to optimize terahertz extraction, channel state information (CSI) estima-
bandwidth allocation and improve spectrum efficien- tion, signal detection, and sparse signal recovery.
cy. In this section, we introduce some state-of-the-art Typical DL algorithms, such as convolutional neural
AI/ML applications in terahertz channel estimation networks, recurrent neural networks (RNNs), deep
and spectrum management. neural networks (DNNs), deep belief networks, and
deep Boltzmann machines, can be expected as good
AI-/ML-Enabled Terahertz Channel candidates.
Modeling and Estimation ■■ RL: RL can be introduced to channel tracking, chan-
At the terahertz frequency bands, the channels suffer nel selection, modulation mode selection, radio
from high atmospheric absorption resulting from the identification, and so on. Feasible algorithms and
water vapor in the air, which influences losses signifi- models include fuzzy RL, Q-learning, WoLF-PHC
cantly. In addition, free-space pathloss is also unavoid- (Win-or-Learn-Fast-Policy Hill-Climbing) Markov
able physically in terms of atmospheric attenuation. decision process (MDP), and partially obser v-
Furthermore, terahertz channels are observed as nonsta- able MDP.
tionary, especially for dynamic scenarios where both
users and objects might be moving. Therefore, tradition- Deep RL-Based Terahertz Spectrum Management
al channel models based on assumptions of being sta- At present, there exists no restriction on terahertz spec-
tionary or quasi-stationary can no longer apply to trum use. The spectra have been occupied already by
terahertz channels. some other applications, such as satellite services, spec-
ML algorithms are capable of analyzing the communi- troscopy, and meteorology [3]. Recently, the Federal
cation data and predicting likely signal loss in a given or Communications Commission has been investing in uti-
unknown environment. Therefore, many different types lizing terahertz spectrums for mobile services and appli-
of AI or ML algorithms can be applied to the physical cations. Therefore, spectrum-sharing methods are
layer (PHL) of 6G networks to deal with the difficulties necessary for the coexistence of future terahertz com-
just described for terahertz channel modeling and es- munications and the other existing applications listed
timation. For instance, to improve estimation accuracy previously. In addition, as discussed in the previous sec-
in dynamic scenarios, the RL-based Bayesian filter has tion, 6G networks tend to be multidimensional, ultra-
been introduced to the angle-of-arrival (AoA) estimation dense, and heterogeneous. Thus, considering that the
in terahertz channels in current studies. Specifically, propagation medium and channel characteristic in inte-
the Bayesian filter implements the estimation of the cur- grated 6G networks are significantly distinct compared
rent AoA from both current measurement and previous with terrestrial networks in 5G, it requires more effort to
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
harvest energy from potential energy resources, e.g., solar energy and make it difficult to solve the optimization
and wind energy. However, such an energy-harvesting problem of energy management, since these energy
scheme is a random process resulting from the intensity constraints are always changing [7]. Feasible approach-
dynamic of energy resources, which means that the es for energy management in energy-harvesting-enabled
amount of energy stored in the battery of each IoT device IoT systems can be divided into offline management and
cannot be known precisely in advance. In addition, the online management, and the latter can be realized
controllable energy is constrained according to the cur- through centralized or distributed methods. Some typi-
rent stored energy, which is also capped by the battery cal mechanisms designed in recent studies are summa-
capacity. Therefore, these problems will lead to the rized in Table 2. Here, we analyze the advantages and
changing and uncertainty of the total controllable disadvantages of these approaches.
Interaction With
Environment Distributed Execution Centralized Training
Spectrum Access
Agent i LSTM
Advantage
Select an Action: of Action: Cell Cell Cell
A (sit, ait ) Input Output
Hidden
Channel Upload (sit, ati)
Selection and Local x0 x1 xn
Observations
Input: 1) Selected Channels at t –1
max Q (s t, at ) Average
i i 2) Capacity of Each Channel
a Q-Value of Input
3) ACK Signal Received Output
State V (sit )
Hidden
Observe
(st–1 t–1 Power Control
State i , a i ) and
Local Observations Mini-Batch θ t+1
sit train
Upload (sit, ati)
and Local
Communication
Observations Experience-
Environment
Action Delay
t
Memory
a it
θ ttrain
Backhaul
Delay of
Receive
Update Td Slots θ ttrain Once per Tu Time Slots Output
a
Reward Input
θtarget Hidden
rit
Spectrum
Upload Historical s1t Allocation r1t
Information: Actor 1 Critic 1
States, Actions, a1t
Rewards of Agent i
Spectrum s2t
Resource Block r2t
Actor 2 Critic 2
Selection a2t
Download Weights
of Actor Network t
sN
Actor N Critic N
atN rNt
Figure 2 The DRL-based spectrum access, power control, and spectrum allocation in 6G networks. ACK: acknowledgment.
Table 2 The typical energy management mechanisms in energy harvesting-enabled large-scale IoT systems.
First Introduced
(See “Tables 2 and 3
AI/ML Technique References”) Category Optimization Objective Applications
Water-filling A. Arafa 2018 [S1] Offline Throughput maximization Energy consumption
optimization
Integer linear H. Ayatollahi Offline Throughput maximization Communication
programming 2017 [S2] scheme selection
Directional water- O. Ozel 2011 [S3] Offline Throughput maximization, Power control
filling delay minimization
DNN, MDP M. K. Sharma Centralized online Time-averaged throughput Power control
2019 [S4] maximization
RL, DQN M. Chu 2019 [S5] Centralized online Uplink sum-rate maximization Multiaccess control
Lyapunov optimization H. Yu 2019 [S6] Centralized online Throughput maximization Power control
RL F. A. Aoudia 2018 [S7] Centralized online QoS maximization Energy harvesting and
RL A. Ortiz 2018 [S8] Centralized online Throughput maximization Power control
RL, MDP K. Wu 2019 [S9] Centralized online Data importance value Communication link
maximization control
Bayesian RL Y. Xiao 2015 [S10] Centralized online Long-term expected Power control, data
reward maximization transmission control
DNN, mean-field M. K. Sharma Distributed online Time-averaged throughput Power control
game (MFG) 2019 [S11] maximization
MDP, MFG D. Wang 2018 [S12] Distributed online Communication delay Power control
minimization
Stochastic game V. Hakami 2017 [S13] Distributed online Communication delay Power control
minimization
Multi-agent RL, A. Ortiz 2017 [S14] Distributed online Sum-rate maximization Power control
Markov game
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
problem. In addition, each IoT device applies DRL indi- embedded intelligence in IoT devices and systems,
vidually to find the optimal power control without any AI-/ML-based security technologies are leveraged to deal
prior information about energy arrivals and channel sta- with these security problems. Next, we discuss some
tus. This distributed approach can achieve throughput existing AI-/ML-based solutions and feasible research
close to centralized policies and can be implemented in directions for addressing authentication, access control,
large-scale IoT systems in practice. and attack detection in super IoT systems. Some recent
typical studies are summarized in Table 3.
Privacy and Security Guarantee for Super IoT
The extremely vast amounts of IoT devices and data AI-/ML-Based Authentication and Access Control
bring great challenges to privacy preservation and secu- Authentication and access control can help IoT devices
rity guarantee. To protect super IoT systems from vari- distinguish identity-based attacks and prevent unauthor-
ous kinds of threats and attacks, authentication, access ized devices from accessing authorized systems [9]. To
control, and attack detection are of paramount impor- improve authentication accuracy, different AI-/ML-based
tance; traditional privacy and security technologies are approaches can perform well based on different scenari-
hardly applicable to super IoT, resulting from the hetero- os and assumptions. In the following, we investigate
geneity of resources, volume of networks, limited energy some feasible AI-/ML-based solutions in authentication
and storage of devices, and so on. By providing and access control problems in super IoT systems.
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
problem of threshold selection can be modeled as an ultrareliable and low-latency communications and also
MDP with finite states. are confronted with challenges brought by high dynam-
■■ Supervised learning: Different from the threshold decision ics, multidimensionality, and significant heterogeneity. In
in Q-learning-based approaches just described, the CSI this section, we discuss some AI-/ML-based solutions tar-
can be exploited through supervised learning to learn geting the improvement of the reliability and timeliness of
how the channel changes, and then the PHL authentica- communications in 6G.
tion problems can be formulated as binary classification
problems, which are threshold free. Typical supervised Intelligent Mobility and Handover Management in 6G
learning algorithms, such as decision tree, SVM, KNN, High-speed mobility of elements in 6G, including satel-
and ensemble learning, then can be introduced to such lites, UAVs, vehicles, and so on, will result in frequent
classification problems to identify the legitimate or illegit- handovers, making the connections and communica-
imate information according to the CSI. tions unstable and unreliable. Moreover, the service
■■ Unsupervised learning: Unsupervised learning, such as requirements of low latency and high transmission rate
nonparametric Bayesian methods, can be introduced will also make it more challenging to achieve efficient
in proximity-based authentication and access control mobility and handover management. Therefore, to sup-
to identify the IoT devices in the proximity without port ultrareliable and low-latency applications in 6G,
leaking the localization and other privacy-sensitive DRL, DL, and RL will be capable and powerful tools to
information of IoT devices. endow the mobility management with intelligence and
■■ DL: According to the CSI in Wi-Fi or other radio signals adaptivity [11].
generated by IoT devices, human physiological and ■■ DRL: In a UAV-enabled 6G network, UAVs can perform
behavioral characteristics can be learned by applying as DRL agents. They can observe the environment
multilayer DNN [10]. Based on activity recognition and states, such as the movement velocity, current posi-
identification, authentication and access control tion, and link quality, and then make the best decisions
schemes then can be designed. in terms of mobility and handover actions to maximize
their rewards, which can be defined considering the
AI-/ML-Based Attack Analysis and Detection link stability, channel quality, transmission latency and
Similar to applications in authentication and access con- capacity, and so on. By interacting with the dynamic
trol, AI/ML technologies also can be applied to analyze environment, UAVs will learn their strategies of mobili-
and detect different kinds of attacks, such as spoofing, ty and handover management automatically and
jamming, denial of service (DoS) or distributed DoS robustly to minimize transmission latency and hando-
(DDoS) attacks, eavesdropping, malware attacks, and so ver failure probability and then will achieve highly reli-
on [9]. For instance, supervised learning, including SVM, able wireless connections in the system.
KNN, random forest (RF), and DNN, can be introduced to ■■ DL: It is necessary to achieve the precise estimation of
detect these attacks by building classification and regres- state for mobility and handover management of UAVs.
sion models. In addition, unsupervised learning can inves- However, the inaccuracies associated with onboard
tigate unlabeled data to divide them into different groups; measurements, such as unpredictable drifts, biases,
e.g., multivariate correlation analysis can help to detect and immense noise resulting from significant vibra-
DoS and DDoS attacks. In some recent studies, RL algo- tion of UAVs’ rotors, make it difficult to obtain accu-
rithms have been applied to help IoT devices make deci- rate state estimates. A DL-based framework that can
sions on the selection of security protocols against apply the ANN, RNN, and so on may help to improve
attacks. The feasible algorithms include Q-learning, DQN, the accuracy of state estimation. To be specific, a
Dyna-Q, and so on. DNN can be trained to identify the associated mea-
surement noise models and then filter them out of the
AI-/ML-Enabled Ultrareliable/Low-Latency Applications final estimation. To further reduce computation com-
Satellite, UAV, and IoV communications will be integrated plexity, the dropout technique also can be adopted
in 6G networks, for which the high dynamics of channel, when training this DNN. In addition, DL also can be
environment, and traffic, as well as increasingly delay- applied to predict trajectories of UAVs. By learning
sensitive applications, require more reliable and low- the movement behaviors of UAVs according to the
latency transmission technologies to guarantee measurement information, the positional relation-
communication connectivity and timeliness. In addition, ships among UAVs can be analyzed. Based on such
accompanying frequent resource allocation, network information, mobility and handover mechanisms with
reconfiguration, and service customization also depend high success rates can be designed. Furthermore,
heavily on reliable, low-latency, and flexible network man- LSTM also can perform as a powerful tool to design
agement. To satisfy such needs, mobility management efficient mobility and handover management schemes
and offloading techniques are expected to support [12]. By training the previous and current mobility
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.
especially for large-scale energy-harvesting networks. and dynamic environments, adapt to unpredictable
Moreover, AI-/ML-based security enhancement mecha- changes in an intelligent and automated fashion, and
nisms, including authentication, access control, and then achieve significantly improved performance in
attack detection, were discussed for super IoT systems. aspects of ultrabroadband, ultramassive access, ultrare-
Such intelligentization of energy and security will help liability, and low latency.
to achieve efficient and reliable ultramassive access. There are still many challenges to realize comprehen-
Furthermore, we introduced some efficient mobility and sive and mature applications of AI/ML techniques in 6G.
handover management approaches based on DRL, DL, Especially for current computing devices with limited
and Q-learning to realize ultrareliable and stable trans- power, memory, storage, and processing capacities, how
mission links and satisfy the high dynamics in 6G. Final- to modify AI-/ML-based algorithms and mechanisms,
ly, intelligent resource allocation technologies, which bring high complexity and huge amounts of com-
including traffic, storage, and computing offloading putation, to get closer to practical implementation is
mechanisms, were identified to meet the requirements worthy of further investigation. In addition, varied and
of ultrareliability and low latency in 6G services. As emerging application scenarios and new AI/ML tech-
investigated in this article, AI-/ML-enabled techniques niques may also bring challenges to the implementation
may allow future 6G networks to learn from uncertain of intelligent technologies in 6G.
• Channel Gain gi Reward αl Data With CPU of Actor Network Q1, Q2, …, QN i = arg maxj ∈NQi
• Computing ri t Frequency f
Capacity fi
(a)
20 100
10
Average Consumed Time (s)
Average Rewards
0 10–1
–10
–20 10–2
–30
10–3
–40
0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 6 7 8 9 10 11 12
Requested Task Load ζ Maximum Harvested Energy emax (10–4 J)
(b) (c)
Figure 3 The framework and simulation results of a hybrid decision-controlled DRL-based dynamic computation offloading scheme in
large-scale IoT systems. (a) An illustration of a hybrid decision-controlled DRL-based dynamic computation offloading scheme. (b) Perfor-
mance versus different task arrival rate. (c) Performance versus different maximum harvested energy. Hybrid-AC: hybrid action–critic;
DQLO: deep Q-learning-based offloading.
Authorized licensed use limited to: Kongu Engineering College. Downloaded on February 23,2022 at 04:40:34 UTC from IEEE Xplore. Restrictions apply.