<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Quantum Computing's Role in the Transition from 5G to 6G- it's Potential and Challenges</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dhriti Bhasin</string-name>
          <email>dhritibhasin11@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sudhakar Kumar</string-name>
          <email>sudhakar@ccet.ac.in</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karan</string-name>
          <email>karan2301@outlook.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anamika Sharma</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>In the coming decade, techno-economic trends are likely to continue and even accelerate. The global economy will continue to be driven by innovation in the field of communication systems. With the deployment of some discrete Artificial Intelligence (AI) functions, 5G is expected to build the groundwork for intelligent networks which will allow for more efficient service management controls. This will be followed by 6G and smart networks and services being utilized at the end of the decade. Quantum Computing (QC), Artificial Intelligence (AI), and Quantum Machine Learning (QML), as well as their union with communication networks, might be considered fundamental in enabling smart systems. This paper briefly addresses topics such as the rise of quantum computing, what is meant by 5G and 6G communications and the advantages of 6G networks over 5G networks. The paper also provides a quick overview of the role of quantum computing in 5G and 6G communication systems, the capabilities of these technologies and the various challenges that can be expected while implementing them. Quantum computing in 6G communication seems to be very promising from the very beginning and is commonly being regarded as the future of wireless communication.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Quantum Computing</kwd>
        <kwd>Quantum Information Technology</kwd>
        <kwd>5G</kwd>
        <kwd>6G Communication Systems</kwd>
        <kwd>Wireless Networks</kwd>
        <kwd>Quantum Communications</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the last several years, quantum technology rollout has accelerated at an unparalleled rate [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Added to this, the implementation of low-latency and ultra-broadband network infrastructures such
as 5G networks has led to a global digitization of various fields [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However, only Beyond-5G
(B5G) networks will be able to provide completely intelligent network orchestration in order to
provide revolutionary services [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Thus, 5G exhibits many fascinating capabilities but 6G will be
needed in the coming time for providing novel telecommunication services with high productivity.
Researchers and tech enthusiasts are thus working profoundly in laying the foundation for 6G
networks. Quantum Computing will play a major role in this transition from 5G to 6G
communications systems, consequently paving way for smart systems and advanced computing.
      </p>
    </sec>
    <sec id="sec-2">
      <title>1.1. The Rise of Quantum Computing</title>
      <p>
        Until recently, quantum computing was thought to be purely theoretical. It is now expected to
assist us in overcoming some of humanity's most daunting problems, moving us forward into the
future. Quantum Information Technology (QIT) and other disruptive information and
communication technologies (ICT) have emerged as crucial facilitators and catalysts for a variety
of new paradigms from numerous key viewpoints, including computing, communication, security,
and intelligence [
        <xref ref-type="bibr" rid="ref19">6,37</xref>
        ]. Quantum computers are rapidly approaching the stage where they will be
able to outperform regular computers in terms of size and dependability. Quantum computing is
thought to have the potential to change the landscapes of artificial intelligence and data analytics.
It will be especially critical in today's Big Data era, which necessitates the processing of massive
volumes of data collected on a daily basis [9].
      </p>
      <p>Quantum computing is based on quantum physics' ideas of superposition, entanglement, and
quantum interference. Quantum computers are immensely powerful when compared to ordinary
computers because they apply these concepts to computing in ways that allow them to handle some
extremely difficult tasks. Qubits (quantum bits) are the primary unit of information in quantum
computing, much as bits (classical bits) are in classical computing. A qubit can have a value of 0,
1, or a quantum superposition of 0 and 1. A classical bit or a binary digit can have only one of the
two values i.e., 0 or 1 [10].</p>
      <p>Quantum computers exploit these benefits of quantum parallelism, which enables exponentially
faster processing than classical computing and, in some cases, quantum supremacy such as in some
optimization problems. Quantum Processing Units will be the name for next-generation processor
units that use quantum computing (QPUs). Google’s Sycamore, for example, is a QPU [6].</p>
    </sec>
    <sec id="sec-3">
      <title>2. Quantum Information Technology (QIT)</title>
      <p>Quantum Information Technology (QIT) combines two important 20th-century breakthroughs,
which are: quantum physics and information technology. Quantum mechanics is one of the most precise
scientific theories which encapsulates the world at its most fundamental level. At the same time
computers, digital communication, and other technologies owe their existence to information
technology, which has changed the way we live. Quantum Information Technology will harness
quantum physics' capacity to usher in a revolutionary new era of technology [13]. The theoretical
groundwork and the building blocks for quantum communications, quantum computers, quantum
sensing, and quantum metrology is laid by Quantum mechanics. Quantum Computing is the
computing concept built upon the principles of quantum theory like superposition and
entanglement. Instead of classical bits, qubits (quantum analogue of classical bits) are used for
computing. These qubits reflect the behavior of material energy at different atomic and
subatomic levels and can exist in more than one state (both “0” and “1” at the same time) [14].
Quantum Computing is based on 2 principles: Superposition and Entanglement. Entanglement,
for example, may be used not just for quantum communications. It may also be used for quantum
sensing and quantum computation. Furthermore, quantum communications and quantum computing
may complement one another and be merged to transform the traditional internet into the quantum
internet of the future [6]. Quantum Communications is the domain of QIT aims at efficient and secure
transfer of information through quantum computing. It is based on the principles of quantum mechanics,
quantum information processing and quantum teleportation. The quantum cryptographic model which
is developed using all these principles helps in secure transmission of qubits between 2 different
quantum servers. Quantum key distribution (QKD) is the most well-known application of quantum
cryptography [15]. Quantum Sensing and Metrology is domain aims at eliminating or reducing all sorts
of noise produced by quantum fluctuations by using the principles of quantum physics. It involves
measurement of the magnitude and direction of tiny magnetic fields and interferometric measurements
of phase shifts using atomic ensembles, trapped ions, solid-state atom like systems and cold atoms. It
has been proposed that qubits used for sensing quantum components and energies on the basis of their
quantum states will set the foundation of new hardware for sensing and metrology [16].</p>
      <p>When contrasted to our experience of the classical or ordinary world, the characteristics that make
quantum physics so strange and amazing also drive its potentially transformative implications in IT. A
quantum processing unit or a multi-qubit processor allows highly parallel quantum computing.
Interference among all the amplitudes in such devices might theoretically be designed to offer solutions
to those problems that even the most powerful traditional supercomputers would never be able to solve
in the future. Using photon qubits and digital communications, two correspondents can communicate
with assured security due to the irreversibility of quantum measurement [17].</p>
    </sec>
    <sec id="sec-4">
      <title>3. 5G Communication</title>
      <p>The short name for the fifth generation, which began in the late 2010s, is 5G technology. It is built
on top of the Open Wireless Architecture (OWA) It also supports WWWW (Wireless World Wide
Web). The 5G mobile data transfer rate can reach 10 Gbps. It has a 1 millisecond delay. It can link up
to 100x the number of devices per unit area [20].</p>
      <p>The 5G network's reduced latency will enable new applications that take advantage of 5G's power,
the internet of things (IoT), and artificial intelligence. Increased capacity on 5G networks can help
reduce the impact of demand spikes, such as those that occur during sporting events and breaking news
stories [20].</p>
    </sec>
    <sec id="sec-5">
      <title>4. 6G Communication</title>
      <p>The sixth generation of wireless communications is referred to as 6G. It transmits data at higher
frequencies, allowing for faster sampling rates in 6G. (To convert a continuous signal to a discrete
signal, the number of measurements taken is called the sampling rate.). 6G data transfer rates are in the
gigabytes per second range. As a result, the amount of data that can be transferred over 6G, also known
as throughput, is far higher than it was with prior wireless communication technologies. Microsecond
latency of 6G wireless data allows communication between people to be instant and resulting in a
distance of zero. A microsecond delay is 1000 times as fast as a millisecond transmission [11].
The following technologies were utilised to implement the 6d data network:</p>
      <p>
        WCDMA Multiplexing (Wideband Code Division Multiple Access), UWB (Ultra White Band)
Radio Technology, LTE (Long Term Evolution), 3GPP (3rd Generation Partnership Project), E-UMTS
(Evolved Universal Mobile Telecommunication System), and E-EDGE (Evolved Evolutionary Data
Rates for GSM (Global System for Mobile) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        6G cellular data is advantageous since it secures and protects mobile data. It also enables for
bufferfree ultrafast streaming. 6G can also be used to play online games in real time. During gaming, 6G
reduces lag significantly. 6G also aids in call forwarding to other numbers. It has smart batteries,
increased storage capacity, and a high Mobile - TV resolution. 6G network technology necessitates a
mobile device with a smart antenna, a high-capacity fibre optic network, and a huge internal memory
[
        <xref ref-type="bibr" rid="ref5">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>Advantages of 6G over 5G</title>
      <p>
        Despite being 50 times faster than 5G, having a 100-fold increase in reliability, having a wider
coverage area, and handling 10 times as many devices per square kilometer as 5G, the 6G network
provides greater reliability than 5G by more than 100 times. By facilitating augmented/virtual reality,
data analytics, imaging, location awareness, and AI machine learning, the 6G network will transform
the healthcare industry. The technology uses Terahertz waves. These waves are utilized in space to
achieve lossless communication between satellites. In order to get the most out of LEDs, 6G wireless
relies on visible light, such as high bandwidth and lighting. The 6G network was recommended in light
of the critical advantages of 6G networks above 5G networks in terms of technological advancement
[
        <xref ref-type="bibr" rid="ref5">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>Quantum Computing in 6G Communication Systems</title>
      <p>
        In the future, the progressively demanding performance fulfillment of the deployment of new
technologies like may finally be triggered by emerging networks from surfaces with very large
intelligence, electron-orbital angular momentum, visible light communications and cell-free technology
communication. The field of quantum communication has also been picking up steam in recent years
and is likely to contribute substantially towards two of the essential criteria of 6G, as it enhances data
security and reliability. The inherent security of quantum entanglement, which cannot be duplicated or
accessed without tampering, suggests that it is suitable for systems that use 6G and beyond [
        <xref ref-type="bibr" rid="ref6">24</xref>
        ].
Quantum communication is not the answer to all security and privacy concerns, however [
        <xref ref-type="bibr" rid="ref20">38</xref>
        ]. Many
works have demonstrated the feasibility of quantum key distribution (QKD) and associated
protocols[
        <xref ref-type="bibr" rid="ref14 ref16">32,34</xref>
        ]. Another advantage of quantum communications is that they can be adapted to wide
area communications. Even though quantum cryptography for quantum communication has advanced
significantly over the past few years, long-distance quantum communication is still difficult due to the
attenuation of fibers and operational errors. The current repeater concept, however, will not work for
quantum communication since entanglement cannot be cloned.
      </p>
    </sec>
    <sec id="sec-8">
      <title>7. Challenges Implementing 6G</title>
      <p>1. Lack in Infrastructural design to meet expected scale:</p>
      <p>The use of 6G tends to be a very high use of computation prowess. 6G networks are
multidimensional, high level, difficult, and reforming due to the network cluster, users desire,
connection loads and the transmission of resources that are available. Thus, for wireless
connection, automatic network configuration is crucial. Similarly, for motile node positioning
in the event of a disaster, intelligent mobility management is crucial.</p>
      <p>These tasks, however, require a significant amount of computational power. In addition to edge
computing, federated artificial intelligence, etc. 6G will be able to resolve those difficulties.
There are still challenges involved with implementing these technologies. Problems exist both
in the individual technologies and in the integration of 6G.
2. Lack at Instrumental level of technological requirements:</p>
      <p>
        For implementing 6G requirements, there is no real technological solution. Even though 6G
offers reassuring advancements, its technical needs are miles behind which could bring it far
beyond 5G. The essential for 6G mobile communications keep increasing exponentially from
5G. Because 6G doesn’t have any foundation tech, it casts doubt on the visioning process at
this point[
        <xref ref-type="bibr" rid="ref9">27</xref>
        ]. Introduction of 5g has just been done recently. And the quality of experience of
5g is very limited to small areas.
3. Lack in means to achieve desired coverage:
      </p>
      <p>
        The 6G will require exceedingly effective and cost-efficient transmitter and receiver antennas.
In order to achieve high integration, the needed radio frequency transceiver should use
advanced silicon nodes, such as bulk CMOS and SiGe BiCMOS, and use carefully designed,
highly effective antennas.[
        <xref ref-type="bibr" rid="ref11">29</xref>
        ] It is essential to find a new balance between RF technologies,
communication, and signal processing in order to meet 6G's requirements.
4. Infrastructural designs for Terahertz communication:
      </p>
      <p>Continuous THz signals are required for 6G transmission. It is however more difficult to
generate continuous THz signals, since the antenna/transmitter design is much more
complicated and has stricter requirements regarding size. In addition, generating THz signals
is expensive. In order for 6G to take advantage of the low-cost advantage claimed by the
technology, its transmission aspect must be low cost. It is also important to note that THz
signals are short-range communication signals (e.g., a few meters, which are still encountered
with 5G mm Wave).
5. Energy Consumption and conservation for real world usage:</p>
      <p>A sophisticated signal processing mechanism will be implemented by every piece of hardware
in 6G, from intelligent systems to access points. Additionally, they must process vast quantities
of Big Data, which requires high levels of processing power. 6G will have to utilize advanced
technologies like AI, Edge in its network nodes, which also dissipate a considerable amount of
energy, so the 6G network will also have to work on the fields of energy harvesting, charging,
and conservation. Furthermore, the transmission of data also demands huge energy, as
discussed.
6. Internet of Everything:</p>
      <p>
        The 6G will open the possibility of IoE and which will generate huge amounts of small blocks
of data. This data is retained, processed and utilized using Cloud Computing[
        <xref ref-type="bibr" rid="ref17 ref21">35,39</xref>
        ]. With the
Data on Internet of Everything (DIoE), a brand-new set of will arise. Up to now, no technology
has been developed that can retain, process, and utilize Exabytes of small blocks of data.
7. Security and Privacy within Quantum realm:
6G will have to have an eminent level of security, secrecy, and privacy. It is foreseen that THz
communication will contribute to 6G becoming unreachable by means of eavesdropping and
jamming [
        <xref ref-type="bibr" rid="ref12">30</xref>
        ]. Similarly, quantum computing has the potential of providing unbreakable
security to the 6G, like, quantum cryptography for secrecy[
        <xref ref-type="bibr" rid="ref15">33</xref>
        ]. Privacy is the major concern
for the individuals, peculiarly, healthcare desires a significant amount of privacy
protection[
        <xref ref-type="bibr" rid="ref20">38</xref>
        ]. A Blockchain-based system can be considered for desired security, privacy, and
secrecy[
        <xref ref-type="bibr" rid="ref18">36</xref>
        ]. Federated AI is another technology that increases security. Another thing to keep
in mind is that 6G guarantees physical layer security. AI will be integrated into 6G to achieve
this. Several researches have been done to explore this option and still in underway [
        <xref ref-type="bibr" rid="ref13">31</xref>
        ].
      </p>
    </sec>
    <sec id="sec-9">
      <title>8. Conclusion</title>
      <p>The authors have presented a brief review of quantum computing, quantum information technology,
and 5G/ 6G communications in this study. They briefly covered the shift from 5G to 6G technology, as
well as the importance of Quantum Computing in that process. This research looks at the possibilities
of 6G communication technologies as well as the obstacles that come with creating and implementing
them. It is reasonable to say that every generation of communication technology provides new and
exciting features. High data transmission rates and reduced latency are only two of the many exciting
features of 5G communication technology. However, by 2030, 5G is expected to be unable to fulfil the
growing demand for wireless access. As a result, 6G technology will be required. 6G research is still in
its early phases and is being closely examined. (QIT) has the potential to enhance and strengthen 6G.
Over 5G, 6G is predicted to feature a combination of incremental and revolutionary advancements. In
order to serve new applications and sectors such as augmented reality, AI Machine Learning, Satellite
Signal Transmission, IoT, Data Analytics, and others, 6G networks must be more efficient, secure,
intelligent, and autonomous. QIT has been envisioned as one of the pivotal technologies for allowing
secure, efficient, intelligent networks and reliable operations.</p>
    </sec>
    <sec id="sec-10">
      <title>9. Acknowledgements</title>
      <p>We wish to acknowledge the help provided by the technical and support staff of the CCET ACM
Student Chapter and the Department of Computer Science &amp; Engineering, CCET(Degree Wing),
Chandigarh. We would also like to show our deep appreciation to our supervisors who helped us in the
finalization of our research paper.
10. References
[5] Sunil Sharma, Sunil Singh, and Subhash Panja, Human Factors of Vehicle Automation, in
Autonomous Driving and Advanced Driver-Assistance Systems (ADAS), Taylor &amp; Francis
Group (CRC Press), Chapter 15, 2021.
[6] Wang, C., &amp; Rahman, A. (2021). Quantum-enabled 6G Wireless Networks: Opportunities
and challenges. https://doi.org/10.36227/techrxiv.14785737
[7] SK Singh, RK Singh, MPS Bhatia, System level architectural synthesis &amp; compilation
technique in reconfigurable computing system, International Conference on Embedded
Systems and Applications (ESA10) WORLCOMP-2010, pp 109-115, July 12-15, 2010.
[8] Sunil Kr. Singh, R. K. Singh, M.P.S. Bhatia, SP Singh, CAD for Delay optimization of
Symmetrical FPGA Architecture through Hybrid LUTs/PLAs, ACIT, Vol. 178, Page
581591, Springer, 2012
[9] Cho, C.-H., Chen, C.-Y., Chen, K.-C., Huang, T.-W., Hsu, M.-C., Cao, N.-P., Zeng, B., Tan,
S.-G., &amp; Chang, C.-R. (2021, May 8). Quantum Computation: Algorithms and applications.
Chinese Journal of Physics.(Retrieved November 19,2021), from
https://www.sciencedirect.com/science/article/abs/pii/S0577907321001039?via%3Dihub.
[10] Lopez, A. S. (n.d.). Understanding quantum computing - azure quantum. Azure Quantum |
Microsoft Docs. Retrieved November 19, 2021, from
https://docs.microsoft.com/enus/azure/quantum/overview-understanding-quantum-computing.
[11] SK Singh, K Kaur, A Aggarawal, Emerging Trends and Limitations in Technology and
System of Ubiquitous Computing, International Journal of Advanced Research in Computer
Science (IJARCS), 5 (7), pp 174-178, 2014.
[12] Sciforce. (2019, February 1). The quest for quantum energies in computing. Medium.</p>
      <p>Retrieved November 19, 2021, from
https://medium.com/sciforce/the-quest-for-quantumenergies-in-computing-ac40d44117c9.
[13] What is Quantum Information Science and Technology? Institute for Quantum Computing.
(2021, April 20). Retrieved November 19, 2021, from
https://uwaterloo.ca/institute-forquantum-computing/quantum-101/quantum-information-science-and-technology.
[14] Frankenfield, J. (2021, December 3). Quantum computing. Investopedia. Retrieved</p>
      <p>December 5, 2021, from https://www.investopedia.com/terms/q/quantum-computing.asp.
[15] Quantum Communication. PicoQuant. (n.d.). Retrieved December 5, 2021, from
https://www.picoquant.com/applications/category/quantum-optics/quantumcommunication.
[16] Finley, J., &amp; Weig, E. (n.d.). Quantum Metrology &amp; Sensing. MCQST. Retrieved
December 5, 2021, from
https://www.mcqst.de/research/quantum-metrology-andsensing/.
[17] Spiller, T. P. (2003, January 15). Quantum Information Technology. Materials Today.</p>
      <p>Retrieved November 19, 2021, from
https://www.sciencedirect.com/science/article/pii/S1369702103001305.
[18] SK Singh, RK Singh, MPS Bhatia, Performance evaluation of hybrid reconfigurable
computing architecture over symmetrical FPGAs, International Journal of Embedded
Systems and Applications 2 (3), 107-116, 2012.
[19] R Madan, SK Singh, N Jain, Signal filtering using discrete wavelet transform, International
journal of recent trends in engineering 2 (3), 96, 2009
[20] Emerging 5G networks feature lower latency, higher capacity. (n.d.). Benefits of 5G
technology: 5G features and advantages. Intel. Retrieved November 19, 2021, from
https://www.intel.com/content/www/us/en/wireless-network/5g-benefits-features.html.
[21] RF Wireless World. Advantages of 6G wireless | disadvantages of 6G wireless. (n.d.).</p>
      <p>Retrieved November 19, 2021, from
https://www.rfwirelessworld.com/Terminology/Advantages-and-Disadvantages-of-6G-Wireless</p>
      <p>Technology.html.
[22] Sudhakar Kumar, Sunil Kr Singh, Naveen Aggarwal, Kriti Aggarwal, Evaluation of
automatic parallelization algorithms to minimize speculative parallelism overheads: An
experiment, pp 1517-1528, 2021 Journal of Discrete Mathematical Sciences and
Cryptography, Volume 24, Issue 5, Taylor &amp; Francis, (2021)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Laforest</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyonnais</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spiller</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Blouin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2021</year>
          ,
          <article-title>October 13). 6G must be quantum</article-title>
          .
          <source>IEEE 5G World Forum (WF-5G)</source>
          .
          <source>Retrieved November 18</source>
          ,
          <year>2021</year>
          , from https://ieee-wf
          <article-title>-5g.org/6g-must-be-quantum/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chopra</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Role of Social Media in the COVID-19 Pandemic: A Literature Review</article-title>
          . In B.
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Peraković</surname>
            ,
            <given-names>A. Abd</given-names>
          </string-name>
          <string-name>
            <surname>El-Latif</surname>
          </string-name>
          , &amp; D.
          <string-name>
            <surname>Gupta</surname>
          </string-name>
          (Ed.),
          <article-title>Data Mining Approaches for Big Data and Sentiment Analysis in Social Media</article-title>
          (pp.
          <fpage>91</fpage>
          -
          <lpage>115</lpage>
          ). IGI Global. http://doi:10.4018/978-1-
          <fpage>7998</fpage>
          -8413-2.
          <fpage>ch004</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Manzalini</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Quantum Communications in future networks and services</article-title>
          .
          <source>Quantum Reports</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <fpage>221</fpage>
          -
          <lpage>232</lpage>
          . https://doi.org/10.3390/quantum2010014
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Nawaz</surname>
            ,
            <given-names>S. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wyne</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patwary</surname>
            ,
            <given-names>M. N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Asaduzzaman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Quantum Machine Learning for 6G Communication Networks: State-of-the-art and vision for the future</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>7</volume>
          ,
          <fpage>46317</fpage>
          -
          <lpage>46350</lpage>
          . https://doi.org/10.1109/access.
          <year>2019</year>
          .2909490
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Mohamed</surname>
            ,
            <given-names>N. (n.d.).</given-names>
          </string-name>
          <article-title>From 5g to 6G: What could it look like? Light Reading</article-title>
          .
          <source>Retrieved November 19</source>
          ,
          <year>2021</year>
          , from https://www.lightreading.com/6g/from-5g
          <string-name>
            <surname>-to-</surname>
          </string-name>
          6g
          <article-title>-what-could-itlook-like/a/d-id/767711.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.K.</given-names>
            <surname>Karagiannidis</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>Fan 6g wireless networks: vision, requirements, architecture, and key technologies</article-title>
          .
          <source>IEEE Veh. Technol. Mag.</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ) (
          <year>2019</year>
          ), pp.
          <fpage>28</fpage>
          -
          <lpage>41</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Chopra</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Predicting Catastrophic Events Using Machine Learning Models for Natural Language Processing</article-title>
          . In B.
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Peraković</surname>
            ,
            <given-names>A. Abd</given-names>
          </string-name>
          <string-name>
            <surname>El-Latif</surname>
          </string-name>
          , &amp; D.
          <string-name>
            <surname>Gupta</surname>
          </string-name>
          (Ed.),
          <article-title>Data Mining Approaches for Big Data and Sentiment Analysis in Social Media</article-title>
          (pp.
          <fpage>223</fpage>
          -
          <lpage>243</lpage>
          ). IGI Global. http://doi:10.4018/978-1-
          <fpage>7998</fpage>
          -8413-2.
          <fpage>ch010</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Sunil</given-names>
            <surname>Kr</surname>
          </string-name>
          . Singh,
          <string-name>
            <surname>Ajay Kumar</surname>
          </string-name>
          , Siddharth Gupta,
          <article-title>Ratnakar Madan, Architectural Performance of WiMAX over WiFi with Reliable QoS over Wireless Communication</article-title>
          , in
          <source>International Journal Advanced Networking and Applications</source>
          (IJANA) [EISSN:
          <fpage>0975</fpage>
          -
          <lpage>0282</lpage>
          ],
          <source>Page 1016- 1023</source>
          , Vol.
          <volume>03</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>01</given-names>
          </string-name>
          ,
          <year>July 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Fitzek</surname>
            ,
            <given-names>F. H. P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Seeling</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2020</year>
          , March 4).
          <article-title>Why we should not talk about 6G</article-title>
          .
          <source>arXiv.org. Retrieved November 19</source>
          ,
          <year>2021</year>
          , from https://arxiv.org/abs/
          <year>2003</year>
          .
          <year>02079</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Bhatia</surname>
          </string-name>
          ,
          <article-title>Design flow of reconfigurable embedded system architecture using LUTs/PLAs,</article-title>
          <year>2012</year>
          2nd IEEE International Conference on Parallel,
          <source>Distributed and Grid Computing</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>385</fpage>
          -
          <lpage>390</lpage>
          , doi: 10.1109/PDGC.
          <year>2012</year>
          .
          <volume>6449851</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matinmikko-Blue</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Latva-Aho</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>6 Genesis flagship program: Building the bridges towards 6G-enabled Wireless Smart Society</article-title>
          and Ecosystem.
          <source>2018 IEEE 10th Latin-American Conference on Communications (LATINCOM)</source>
          . https://doi.org/10.1109/latincom.
          <year>2018</year>
          .8613209
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Dang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shihada</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Alouini</surname>
            ,
            <given-names>M.-S.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <source>What should 6G be? Nature Electronics</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ),
          <fpage>20</fpage>
          -
          <lpage>29</lpage>
          . https://doi.org/10.1038/s41928-019-0355-6
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Al-Eryani</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hossain</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>The D-OMA method for massive multiple access in 6G: Performance, security, and challenges</article-title>
          .
          <source>IEEE Vehicular Technology Magazine</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ),
          <fpage>92</fpage>
          -
          <lpage>99</lpage>
          . https://doi.org/10.1109/mvt.
          <year>2019</year>
          .2919279
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Megha</given-names>
            <surname>Quamara</surname>
          </string-name>
          (
          <year>2021</year>
          ),
          <source>Beyond Classical Cryptography: A Technical View Cultivating Quantum Cryptography, Insights2Techinfo</source>
          , pp.
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Megha</given-names>
            <surname>Quamara</surname>
          </string-name>
          (
          <year>2021</year>
          ),
          <article-title>Quantum Computing: A Threat for Information Security or Boon to Classical Computing?</article-title>
          ,
          <source>Insights2Techinfo</source>
          , pp.
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Pljonkin</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rumyantsev</surname>
            ,
            <given-names>K. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korovin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Schaefer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2017</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Features of detection of a single-photon pulse at synchronisation in quantum key distribution systems</article-title>
          .
          <source>In 2017 6th International Conference on Informatics, Electronics and Vision &amp; 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Stergiou</surname>
            ,
            <given-names>C. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Psannis</surname>
            ,
            <given-names>K. E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>IoT-based big data secure management in the fog over a 6G wireless network</article-title>
          .
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>8</volume>
          (
          <issue>7</issue>
          ),
          <fpage>5164</fpage>
          -
          <lpage>5171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box</article-title>
          .
          <source>IEEE Transactions on Industrial Informatics.</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaurav</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytras</surname>
            ,
            <given-names>M. D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Razzak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A fine-grained access control and security approach for intelligent vehicular transport in the 6g communication system</article-title>
          .
          <source>IEEE Transactions on Intelligent Transportation Systems</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>Ab</given-names>
            <surname>Malek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S. B.</given-names>
            ,
            <surname>Ahmadon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A. B.</given-names>
            ,
            <surname>Yamaguchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            , &amp;
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. B.</surname>
          </string-name>
          (
          <year>2016</year>
          , October).
          <article-title>On privacy verification in the IoT service based on PN 2</article-title>
          .
          <source>In 2016 IEEE 5th Global Conference on Consumer Electronics</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Manasrah</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment</article-title>
          .
          <source>Cluster Computing</source>
          ,
          <volume>22</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1639</fpage>
          -
          <lpage>1653</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>