<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="review-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">64028</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.064028</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Review</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks</article-title>
<alt-title alt-title-type="left-running-head">A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks</alt-title>
<alt-title alt-title-type="right-running-head">A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Shah</surname><given-names>A. F. M. Shahen</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>shah@yildiz.edu.tr</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Karabulut</surname><given-names>Muhammet Ali</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Kamruzzaman</surname><given-names>Abu</given-names></name><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Alharthi</surname><given-names>Dalal</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Bradford</surname><given-names>Phillip G.</given-names></name><xref ref-type="aff" rid="aff-5">5</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Electronics and Communication Engineering, Yildiz Technical University</institution>, <addr-line>Istanbul, 34220</addr-line>, <country>T&#x00FC;rkiye</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Electronics Engineering, Turkish Air Force Academy, National Defense University</institution>, <addr-line>Istanbul, 34129</addr-line>, <country>T&#x00FC;rkiye</country></aff>
<aff id="aff-3"><label>3</label><institution>Department of Business and Economics, School of Business and Information Systems, York College, The City University of New York</institution>, <addr-line>New York, NY 11451</addr-line>, <country>USA</country></aff>
<aff id="aff-4"><label>4</label><institution>College of Applied Sci &#x0026; Tech, The University of Arizona</institution>, <addr-line>Tuscon, AZ 85721</addr-line>, <country>USA</country></aff>
<aff id="aff-5"><label>5</label><institution>Department of Computer Science, University of Connecticut</institution>, <addr-line>Stamford, CT 06901</addr-line>, <country>USA</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: A. F. M. Shahen Shah. Email: <email>shah@yildiz.edu.tr</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>03</day><month>07</month><year>2025</year>
</pub-date>
<volume>84</volume>
<issue>2</issue>
<fpage>1981</fpage>
<lpage>2013</lpage>
<history>
<date date-type="received">
<day>02</day>
<month>2</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>30</day>
<month>4</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_64028.pdf"></self-uri>
<abstract>
<p>The advent of 6G wireless technology, which offers previously unattainable data rates, very low latency, and compatibility with a wide range of communication devices, promises to transform the networking environment completely. The 6G wireless proposals aim to expand wireless communication&#x2019;s capabilities well beyond current levels. This technology is expected to revolutionize how we communicate, connect, and use the power of the digital world. However, maintaining secure and efficient data management becomes crucial as 6G networks grow in size and complexity. This study investigates blockchain clustering and artificial intelligence (AI) approaches to ensure a reliable and trustworthy communication in 6G. First, the mechanisms and protocols of blockchain clustering that provide a trusted and effective communication infrastructure for 6G networks are presented. Then, AI techniques for network security in 6G are studied. The integration of AI and blockchain to ensure energy efficiency in 6G networks is addressed. Next, this paper presents how the 6G&#x2019;s speed and bandwidth enables AI and the easy management of virtualized systems. Using terahertz connections is sufficient to have virtualized systems move compute environments as well as data. For instance, a computing environment can follow potential security violations while leveraging AI. Such virtual machines can store their findings in blockchains. In 6G scenarios, case studies and real-world applications of AI-powered secure blockchain clustering are given. Moreover, challenges and promising future research opportunities are highlighted. These challenges and opportunities provide insights from the most recent developments and point to areas where AI and blockchain further ensure security and efficiency in 6G networks.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>AI</kwd>
<kwd>blockchain</kwd>
<kwd>clustering</kwd>
<kwd>energy efficiency</kwd>
<kwd>security</kwd>
<kwd>challenges</kwd>
<kwd>future perspectives</kwd>
<kwd>6G</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Wireless communication technology has advanced at an unprecedented rate. These wireless advances add value to numerous areas of our lives. Significant gains have been made with the implementation of 5G networks, including faster data speeds, lower latency, and better connectivity. However, an even more advanced wireless infrastructure is required to fulfill the needs of upcoming applications such as self-driving cars, the Internet of Things (IoT), and virtual reality. In this context, the 6G protocol proposals seek to transcend the constraints of 5G by introducing previously unimaginable capabilities [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>The 6G proposals offer critical infrastructure for IoT systems. Particularly, 6G is expected to have features such as ultra-fast data transfer, low latency, and high reliability. However, despite these advantages offered by 6G, issues such as security, scalability, and energy efficiency have not yet been fully resolved. The security vulnerabilities that occur when connecting IoT devices to the 6G network will be a critical problem, especially in terms of decentralized identity management and data integrity. Existing studies independently address solutions such as blockchain or artificial intelligence in IoT security. Combining these technologies has not been sufficiently investigated. AI-based threat detection systems have great potential for IoT security, but there is still an open question about how existing AI security solutions should be optimized due to the decentralized and ultra-high-speed nature of 6G [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-6">6</xref>]. Blockchain and AI-based security solutions require more data processing power and low latency in 6G compared to traditional networks. However, how these two technologies can work together more effectively and be scalable is not yet understood.</p>
<p>6G enables IoT devices to operate faster and more reliably with ultra-low latency and high bandwidth. It also offers advanced security mechanisms and AI-supported automation processes for IoT devices. The rapid increase in the number of IoT devices leads to issues such as handling big data analytics, secure authentication, and energy efficiency. The next-generation network architecture offered by 6G should be optimized to meet these requirements. This study examines how IoT can be integrated with 6G securely and efficiently and discusses how AI and blockchain-based security solutions can contribute to this process [<xref ref-type="bibr" rid="ref-7">7</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]. Given the low latency and high bandwidth expected for 6G networks, these networks go beyond moving data efficiently to give the opportunity for moving virtual compute environments. Moving these virtual compute environments offers a lot, including optimization and security. As an example, this survey explores virtual Raspberry Pis as systems that can be migrated to follow incidents while leveraging blockchain technology and AI. Migrating virtual machines quickly is feasible due to the speed and bandwidth of 6G.</p>
<p>This article analyzes the use of AI and blockchain clustering to improve security in 6G wireless networks. Blockchain clustering divides the blockchain network into smaller clusters to improve scalability and efficiency. AI approaches can be used to improve cluster management and identify security issues. <xref ref-type="table" rid="table-1">Table 1</xref> demonstrates that our study differs from previous survey papers.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Difference between our survey and other survey papers of a similar nature</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Surveys</th>
<th>AI</th>
<th>Blockchain clustering</th>
<th>Enhanced security in 6G</th>
</tr>
</thead>
<tbody>
<tr>
<td>Pathak et al. [<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
<td></td>
</tr>
<tr>
<td>Velliangiri et al. [<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td></td>
<td>&#x221A;</td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Zhang et al. [<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>&#x221A;</td>
<td></td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Mao et al. [<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>&#x221A;</td>
<td></td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Liu et al. [<xref ref-type="bibr" rid="ref-15">15</xref>]</td>
<td></td>
<td>&#x221A;</td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Kamal et al. [<xref ref-type="bibr" rid="ref-16">16</xref>]</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
<td></td>
</tr>
<tr>
<td>Bargavi et al. [<xref ref-type="bibr" rid="ref-17">17</xref>]</td>
<td></td>
<td>&#x221A;</td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Alanhdi and Toka [<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
<td></td>
</tr>
<tr>
<td>Rustemi et al. [<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
<td></td>
</tr>
<tr>
<td>Bhat et al. [<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td></td>
<td>&#x221A;</td>
<td>&#x221A;</td>
</tr>
<tr>
<td>Our Survey</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
<td>&#x221A;</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This study makes the following significant contributions to the literature on 6G security:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>A comprehensive perspective: A comprehensive overview of the security implications of AI and blockchain clustering in 6G networks is presented.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI and blockchain integration: How the synergistic integration of AI and blockchain enhances 6G security is investigated.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Future directions: Future directions and open research issues for AI and blockchain research in 6G security are identified.</p></list-item>
</list></p>
<p>The rest of the paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> discusses the concept of blockchain clustering and its benefits in 6G networks. <xref ref-type="sec" rid="s3">Section 3</xref> examines related AI techniques for 6G security. <xref ref-type="sec" rid="s4">Section 4</xref> presents the architecture and mechanisms of AI and blockchain integration. <xref ref-type="sec" rid="s5">Section 5</xref> discusses case studies and applications that demonstrate the effectiveness of the proposed approach. <xref ref-type="sec" rid="s6">Section 6</xref> highlights the challenges encountered and future research directions. Finally, <xref ref-type="sec" rid="s7">Section 7</xref> summarizes the conclusions of the paper.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Blockchain Clustering Security for 6G</title>
<p>Blockchain is a distributed ledger system that provides a decentralized, transparent, and immutable structure. Each block comprises a series of transactions that are cryptographically linked to the previous block, making it intractable to modify or erase data. These characteristics make blockchain an excellent solution for 6G security because blockchains provide dependable data sharing, authentication, and authorization processes. However, blockchain technology&#x2019;s scalability and performance constraints can present issues, particularly in networks that need high data rates and dense device connections, such as 6G. At this stage, blockchain clustering appears to be a potential method for overcoming these restrictions by leveraging 6G network requirements [<xref ref-type="bibr" rid="ref-21">21</xref>&#x2013;<xref ref-type="bibr" rid="ref-25">25</xref>]. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> shows a application scheme blockchain for 6G.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Blockchain applications for 6G</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-1.tif"/>
</fig>
<p>Blockchain clustering is the partitioning of blockchain nodes into smaller, logically grouped clusters based on shared security needs, geographic distribution, or transaction types. Unlike sharding, which distributes ledger storage and transactions across independent chains for scalability, clustering enhances security and efficiency by forming groups of nodes that work together dynamically. This enables data exchange and resource sharing between different blockchains while also providing the flexibility required to deal with the complexities of 6G networks. For example, a study by [<xref ref-type="bibr" rid="ref-26">26</xref>] found that blockchain clustering provides a secure and scalable communication infrastructure for IoT devices. In this study, devices within each cluster use their blockchain networks, so communication between clusters is safe. The blockchain clustering approaches described in <xref ref-type="table" rid="table-2">Table 2</xref> have the potential to significantly increase security and efficiency in 6G networks.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>The blockchain clustering methods</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Clustering method</th>
<th>Description</th>
<th>Security impacts</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Clustering by geographic location</bold></td>
<td>Nodes are grouped into clusters based on their geographic location. This facilitates communication between nearby nodes and reduces network latency.</td>
<td>Isolation of attacks within a specific region<break/>Increased resistance to distributed denial-of-service (DDoS) attacks<break/>Implementation of local security policies</td>
</tr>
<tr>
<td><bold>Clustering by connection strength</bold></td>
<td>Nodes are grouped into clusters based on their network connectivity. This allows for more efficient use of resources and increased network performance.</td>
<td>Protection of critical nodes<break/>Optimization of security resources<break/>Creation of high-performance clusters</td>
</tr>
<tr>
<td><bold>Clustering by confidence level</bold></td>
<td>Nodes are grouped into clusters based on their trustworthiness. This prevents malicious nodes from harming the network and increases security.</td>
<td>Isolation of malicious nodes<break/>Increased resistance to Sybil attacks<break/>Creation of reliable clusters</td>
</tr>
<tr>
<td><bold>Hybrid clustering</bold></td>
<td>Combining different clustering methods creates a more flexible and efficient network structure. For example, geographic location and trustworthiness can be used together to create clustering that both reduces latency and increases security.</td>
<td>Flexible and adaptable network structure<break/>Meeting different security requirements<break/>Enhanced security and performance</td>
</tr>
<tr>
<td><bold>AI-Assisted clustering</bold></td>
<td>Artificial intelligence algorithms provide dynamic and automatic clustering by analyzing network conditions and security threats. This allows the network to adapt to changing conditions and proactively address vulnerabilities.</td>
<td>Dynamic and automatic cluster management<break/>Advanced security threat analysis<break/>Proactive remediation of vulnerabilities</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s2_1">
<label>2.1</label>
<title>Blockchain Clustering Methods</title>
<p>Blockchain clustering can be implemented using different architectures and protocols. Some of the commonly used methods are:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>A structure in which a pre-selected group of nodes manages the blockchain network. This can increase scalability and performance, but reduce decentralization. For example, Hyperledger Fabric [<xref ref-type="bibr" rid="ref-27">27</xref>] is a federation-based blockchain platform that can be used for applications such as identity management and access control in 6G networks.</p></list-item>
<list-item><label>&#x2B9A;</label><p>These are secondary blockchains linked to the main blockchain. Sidechains promote scalability by minimizing the strain on the main chain and are suitable for specialized applications. For example, Liquid Network [<xref ref-type="bibr" rid="ref-28">28</xref>] or the Stacks chain [<xref ref-type="bibr" rid="ref-29">29</xref>] are sidechains that connect to the Bitcoin blockchain and enables rapid and secure transactions. Sidechains in 6G networks can be leveraged for different services.</p></list-item>
<list-item><label>&#x2B9A;</label><p>It allows transactions to be processed in parallel by dividing the blockchain network into smaller pieces (shards). This significantly increases transaction speed and network capacity. Zilliqa [<xref ref-type="bibr" rid="ref-30">30</xref>] is a blockchain platform that uses sharding. So Zilliqa may be suitable for 6G applications that require high transaction throughput.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Protocols that allow data sharing between blockchain networks. This allows different blockchains to collaborate and increases flexibility in the 6G ecosystem. Cosmos [<xref ref-type="bibr" rid="ref-31">31</xref>] is one example of a protocol that offers interoperability between different blockchains and can help integrate heterogeneous blockchain networks in 6G networks.</p></list-item>
</list></p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Benefits of Blockchain Clustering in 6G Security</title>
<p>Blockchain clustering offers several benefits to increase security in 6G networks:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Blockchain clustering&#x2019;s distributed and immutable structure reduces single points of failure and improves cyber-attack resistance.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchain clustering increases the scalability and efficiency of 6G networks by distributing the processing load.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchain clustering can be integrated with techniques such as zero-knowledge proofs and homomorphic encryption to increase privacy protection. For example, a study by [<xref ref-type="bibr" rid="ref-32">32</xref>] provided secure and confidential data sharing in 6G networks using blockchain clustering and homomorphic encryption.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchain-based authentication systems provide reliable and secure identity management in 6G networks.</p></list-item>
</list></p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Challenges of Blockchain Clustering</title>
<p>The application of blockchain clustering to 6G security also presents some challenges:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Standards are needed to ensure interoperability between different blockchain platforms.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchain clustering architectures can be complex and difficult to implement.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Some blockchain clustering methods result in high energy consumption.</p></list-item>
</list></p>
<p>Despite these challenges, blockchain clustering has significant potential to improve security in 6G networks. Future research should focus on addressing these challenges and further improving the effectiveness of blockchain clustering in 6G security.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>AI Techniques</title>
<p>AI refers to a set of techniques and procedures that allow computer systems to demonstrate human-like intelligence. Given the complexity and dynamic nature of 6G networks, AI is critical for identifying, preventing, and responding to security attacks [<xref ref-type="bibr" rid="ref-33">33</xref>&#x2013;<xref ref-type="bibr" rid="ref-36">36</xref>]. In this section, we look at the primary AI techniques that can be utilized to improve 6G security. The AI approaches listed in <xref ref-type="table" rid="table-3">Table 3</xref> provide effective tools for increasing security in 6G networks. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows AI-enabled applications for 6G networks.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Various AI techniques</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>AI technique</th>
<th>Description</th>
<th>Security impacts</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Machine Learning (ML)</bold></td>
<td>ML is a type of AI that allows computers to learn from data without being explicitly programmed. In 6G networks, ML algorithms can be used to analyze network traffic, detect anomalies, and predict attacks.</td>
<td>Detection of network attacks and anomalies<break/>Development of intrusion prevention systems<break/>Detection of vulnerabilities</td>
</tr>
<tr>
<td><bold>Deep Learning (DL)</bold></td>
<td>DL is a subset of ML that uses multilayered artificial neural networks. DL algorithms are increasingly used in 6G network security due to their ability to learn complex patterns and analyze large data sets.</td>
<td>Detection of complex attacks and anomalies<break/>Detection of zero-day attacks<break/>Advanced security analytics</td>
</tr>
<tr>
<td><bold>Natural Language Processing (NLP)</bold></td>
<td>NLP is a field of AI that allows computers to understand and process human language. In 6G networks, NLP can be used to analyze text-based data (e.g., social media posts, forums) to identify security threats.</td>
<td>Detection of social engineering attacks<break/>Early warning system of security threats<break/>Analysis of security incidents</td>
</tr>
<tr>
<td><bold>Computer Vision</bold></td>
<td>Computer vision is a field of AI that allows computers to &#x201C;see&#x201D; and interpret images. In 6G networks, computer vision can be used to analyze images from security cameras and detect anomalies.</td>
<td>Detection of physical security breaches<break/>Prevention of unauthorized access<break/>Image-based security analytics</td>
</tr>
<tr>
<td><bold>Reinforcement Learning (RL)</bold></td>
<td>RL is a type of ML that allows an agent to learn by interacting with an environment and receiving rewards. In 6G networks, RL algorithms can be used to optimize security policies and allocate resources efficiently in dynamic environments.</td>
<td>Creation of dynamic security policies<break/>Optimization of network resources<break/>Automatic response to security threats</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>AI-enabled applications for 6G network</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-2.tif"/>
</fig>
<sec id="s3_1">
<label>3.1</label>
<title>Machine Learning (ML)</title>
<p>Machine learning (ML) is an area of AI that allows systems to learn from data without being explicitly programmed. Analyzing network traffic allows ML systems to discover anomalies, categorize malware, and predict attacks in 6G security. For example, Ref. [<xref ref-type="bibr" rid="ref-37">37</xref>] presents a solution to detect DDoS attacks in 6G networks based on unsupervised learning algorithms. This technology detects irregularities in network traffic and blocks attacks in real time. Similarly, the authors of [<xref ref-type="bibr" rid="ref-38">38</xref>] created a machine learning model for detecting intrusions in 6G networks. Analyzing network data allows this model to detect odd behavior and avoid security breaches.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Deep Learning (DL)</title>
<p>Deep learning (DL) is a kind of machine learning that uses multilayer artificial neural networks to extract complicated patterns from data. DL is particularly useful for dealing with massive datasets and complicated security risks. In 6G security, deep learning can be utilized for tasks including image identification, natural language processing, and time series analysis. For example, the authors of [<xref ref-type="bibr" rid="ref-39">39</xref>] suggested a deep learning model for detecting malware in 6G networks. This technique can categorize malware samples accurately and improve network security. This technology can analyze network configurations to identify potential security concerns and provide preventive steps.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title> Reinforcement Learning (RL)</title>
<p>Reinforcement learning (RL) is an AI technique that enables an entity to learn by interacting with its surroundings and getting incentives. In 6G security, RL can be utilized to create self-learning systems capable of adapting to changing environments and optimizing security rules. For example, Adawadkar and Kulkarni [<xref ref-type="bibr" rid="ref-40">40</xref>] presented a reinforcement learning approach to improve resource allocation and prevent security assaults in 6G networks. This technique, which dynamically allocates network resources, can reduce the impact of attacks while improving network speed.</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title> Other AI Techniques</title>
<p>In addition to the techniques mentioned above, other AI techniques can be used to enhance 6G security. These include fuzzy logic, genetic algorithms, and expert systems. Fuzzy logic can be used to address uncertainty and complexity, while genetic algorithms can be used to optimize security parameters. Expert systems can be used to make security decisions by imitating human expertise. The integration of AI techniques into 6G security offers a powerful toolkit to combat complex and ever-evolving cyber threats. These techniques increase the reliability and security of 6G networks by making security systems more proactive, adaptive, and effective [<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-42">42</xref>].</p>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>AI Clustering</title>
<p>AI clustering is a machine learning method that recognizes certain patterns by analyzing large data sets and makes dynamic decisions using this information. AI clustering can be used for the following basic purposes in 6G networks:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>AI clustering can detect deviations from normal by analyzing network traffic and can identify cyberattacks at an early stage. For example, during a DDoS attack, abnormal traffic clusters can be automatically identified by AI algorithms, and preventive measures can be taken.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI-supported clustering algorithms can allocate resources such as bandwidth, processing power, the location of virtual compute environments, and energy consumption in the most efficient way in 6G networks. For example, by analyzing the traffic density of mobile users in a certain area with AI clustering, the load distribution of base stations can be optimized.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI clustering can create dynamic authentication systems to prevent security breaches by analyzing user behavioral data. For example, when there is an unusual login attempt, the AI model can automatically activate additional security measures.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Integration of AI and Blockchain</title>
<p>6G wireless networks may be characterized by unprecedented scale of data generation and device connectivity. This leads to the inadequacy of traditional security mechanisms and makes the network vulnerable to many cyber threats. The integration of AI and blockchain technologies emerges as a promising solution to strengthen 6G security and overcome these challenges. While AI offers intelligent decision-making and automated response capabilities, blockchain provides a reliable and transparent platform. The synergistic combination of these two technologies offers new possibilities to address vulnerabilities and establish a reliable communication infrastructure in 6G networks [<xref ref-type="bibr" rid="ref-43">43</xref>&#x2013;<xref ref-type="bibr" rid="ref-46">46</xref>]. The integration methods outlined in <xref ref-type="table" rid="table-4">Table 4</xref> illustrate how AI and blockchain technologies can be combined to improve security in 6G networks.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Integration of artificial intelligence and blockchain technologies</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Integration method</th>
<th>Description</th>
<th>Security impacts</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>AI-Enabled blockchain consensus mechanisms</bold></td>
<td>AI algorithms can be used to develop more efficient and secure consensus mechanisms in blockchain networks. For example, machine learning models can be used to detect malicious nodes and prevent network attacks.</td>
<td>Faster and more efficient transaction verification<break/>Improved security and attack resistance<break/>Reduced energy consumption</td>
</tr>
<tr>
<td><bold>Blockchain-Based AI models</bold></td>
<td>AI models can be trained and deployed in a distributed manner using blockchain technology. This increases the security and transparency of models while reducing data manipulation and bias.</td>
<td>Increased model reliability and integrity<break/>Protecting data privacy and security<break/>Increased model transparency and accountability</td>
</tr>
<tr>
<td><bold>Blockchain-Based security auditing</bold></td>
<td>Blockchain technology can provide a reliable and transparent platform for security auditing in 6G networks. Network events and security breaches can be recorded on the blockchain in an immutable manner, allowing the incidents to be reviewed and analyzed later.</td>
<td>Detection and analysis of security incidents<break/>Determining the source of attacks<break/>Remediation of security vulnerabilities</td>
</tr>
<tr>
<td><bold>Blockchain-Based identity management</bold></td>
<td>Blockchain technology can provide a secure and decentralized identity management system in 6G networks. Users can securely store and manage their credentials on the blockchain, preventing identity theft and unauthorized access.</td>
<td>Secure authentication and authorization<break/>Protection of personal data<break/>Increased user privacy</td>
</tr>
<tr>
<td><bold>AI-Enabled smart contracts</bold></td>
<td>AI algorithms can be used to enhance the functionality and security of smart contracts. For example, machine learning models can be used to detect anomalies in smart contracts and prevent fraud.</td>
<td>Automation and optimization of smart contracts<break/>Reducing vulnerabilities and errors<break/>Increased reliability and transparency of smart contracts</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>6G networks pose critical security challenges with their ultra-low latency, large-scale connections, and broadband data transfer features. To solve these challenges, artificial intelligence can detect threats in real time using big data analysis and take adaptive security measures. However, the accuracy and integrity of the decision mechanisms of AI-based security systems are a major problem. At this point, blockchain increases the reliability of AI by providing transparency and data integrity to decision mechanisms. For example, security threats identified by AI-supported anomaly detection can be recorded on the blockchain, ensuring that all security nodes in the network have simultaneous information. Thus, decentralized security management becomes possible.</p>
<p>Training AI models usually requires large data sets, and it is important to store and share this data securely. Blockchain provides a decentralized and immutable data storage environment, providing secure and verifiable data usage during the training of AI models. For example, when AI models need to be trained with patient data in the medical and healthcare sector, blockchain can be used to protect data ownership, ensure data validity, and prevent unauthorized access.</p>
<p>AI-based biometric verification systems can be integrated into blockchain to ensure that user credentials are kept secure in a decentralized manner. By combining AI&#x2019;s dynamic threat detection and automatic response capabilities of blockchain-based smart contracts, autonomous security measures can be taken in 6G networks. Large data sets analyzed with AI can be encrypted and securely stored on the blockchain, preventing data manipulation and forgery.</p>
<p>Blockchain and AI integration is not just a theoretical combination, but an important requirement to ensure security, data integrity, and system transparency, especially in complex network environments such as 6G. Thanks to this integration, AI&#x2019;s decision-making mechanisms can be secured and the integrity of the data used by AI can be ensured. Therefore, the combined use of AI and blockchain creates a new paradigm shift in modern security systems.</p>
<p>6G enables real-time processing of large volumes of data by providing ultra-high data speeds (up to 1 Tbps). With latencies falling below milliseconds, the ability of AI-supported systems to make instant decisions is increased. Dynamic spectrum management, network optimization, and self-adaptive security mechanisms can be provided using AI. 6G increases the need for decentralized security approaches, and at this point, blockchain plays a critical role in issues such as secure data sharing and identity verification. In this context, the integration of AI and blockchain into the 6G ecosystem is not just an option, but a necessity to increase network security and efficiency.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Benefits of AI and Blockchain Integration in 6G Security</title>
<p>The integration of AI and blockchain can improve security in 6G networks in the following ways:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>AI algorithms can detect anomalies and prevent attacks in real time by analyzing large amounts of data stored on the blockchain. For example, Liu et al. [<xref ref-type="bibr" rid="ref-47">47</xref>] proposed an AI-based system to detect vulnerabilities in smart contracts on the blockchain. This system can identify potential security risks and prevent attacks by analyzing smart contract code.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchains provide a secure platform for identity management and access control by providing a decentralized and immutable structure. AI can be used to automate identity verification processes and prevent unauthorized access. For example, Al Hwaitat et al. [<xref ref-type="bibr" rid="ref-48">48</xref>] developed a system that combines blockchain and biometric authentication techniques for secure authentication in 6G networks. This system prevents unauthorized access by securely verifying user&#x2019;s identities.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchains enable secure and transparent sharing of data. AI can develop encryption and anonymization techniques to protect the confidentiality of sensitive data. For example, Gao et al. [<xref ref-type="bibr" rid="ref-49">49</xref>] proposed a system that combines blockchain and federated learning techniques for secure data sharing in 6G networks. This system facilitates data sharing and collaboration by preserving the confidentiality of data.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchains increase the resilience of 6G networks by eliminating a single point of failure thanks to their decentralized structure. AI can further strengthen this resilience by optimizing network resources and dynamically responding to attacks.</p></list-item>
</list></p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Challenges and Future Directions of AI and Blockchain Integration</title>
<p>Although AI and blockchain integration have great potential to enhance 6G security, it also presents some challenges. These include blockchain&#x2019;s scalability limitations, the need for large datasets for training AI models, and ensuring interoperability between different AI and blockchain platforms [<xref ref-type="bibr" rid="ref-50">50</xref>&#x2013;<xref ref-type="bibr" rid="ref-52">52</xref>]. Future research should focus on addressing these challenges to further enhance the effectiveness of AI and blockchain integration in 6G security.</p>
<p>AI-powered network security solutions detect threats with 30% higher accuracy than traditional systems. It has been measured that blockchain-based data storage systems provide 99.9% data immutability compared to centralized databases. It has been observed that network latency is reduced by 25% as a result of optimizing blockchain consensus algorithms with AI-based prediction systems [<xref ref-type="bibr" rid="ref-53">53</xref>&#x2013;<xref ref-type="bibr" rid="ref-55">55</xref>]. This data shows that AI and blockchain integration provide not only theoretical but also measurable, tangible advantages in 6G networks.</p>
<p>Thanks to the integration of AI-based sensor data analysis with blockchain-based verification mechanisms, fake data injection attacks are reduced by 40%. Storing medical data analyzed with AI in encrypted form on blockchain reduces patient data breaches by 35%. Energy efficiency has been improved by up to 20% thanks to the management of energy consumption predictions with blockchain-based smart contracts with AI [<xref ref-type="bibr" rid="ref-56">56</xref>&#x2013;<xref ref-type="bibr" rid="ref-59">59</xref>].</p>
<p>Considering the existing studies on AI and blockchain, the original contributions of this article are clarified. While previous research has generally focused on either AI or blockchain, this study highlights the benefits of integration in the context of 6G. It also discusses in detail how these technologies can be optimized together, particularly in terms of scalability and energy efficiency.</p>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>Practical and Real-life Uses of AI and Blockchain in 6G</title>
<p>AI-supported threat detection systems can identify dynamic security threats in real time in 6G, and threat records can be stored immutably with blockchain-based distributed security infrastructures. Given the decentralized structure of 6G, blockchain-based identity verification systems can ensure the security of personal data. Also, fraud detection can be improved with AI-supported analysis. AI-supported driving assistants and communicating vehicles can create a reliable and manipulation-resistant communication infrastructure thanks to blockchain-based secure data sharing protocols. In 6G-supported smart city applications, AI can improve instant decision-making processes with big data analytics, while blockchain can increase data security.</p>
<p>AI-based sensor data analysis and blockchain-based trusted data sharing mechanisms can protect autonomous vehicles from spoofed signals. For example, one study reported that blockchain-supported data verification mechanisms provide 30% higher security in autonomous vehicle systems. Medical imaging data analyzed with AI can be stored immutably using blockchains and made accessible only to authorized persons. For example, it has been observed that the rate of misdiagnosis has decreased by 20% as a result of integrating AI-supported patient diagnosis systems with blockchains. When AI-supported threat detection systems are combined with blockchain-based attack recording mechanisms, the time to detect attacks has accelerated by 40%. These examples show how AI and blockchains can be effectively combined in real-world scenarios.</p>
<p>Blockchains allow transactions to be performed in parallel by fragmenting the blockchain network and increasing scalability. For example, the Ethereum 2.0 network aims to increase transaction capacity using sharding. The concept discussed in this study refers to the coming together of certain groups of nodes to perform certain tasks. For example, AI-supported blockchain clustering can direct security-sensitive transactions to certain trusted nodes. Unlike sharding, clustering focuses on data storage and security optimization. These differences will help clarify the concept of blockchain clustering and prevent readers from confusing this approach with sharding.</p>
<p>6G&#x2019;s low latency supports AI&#x2019;s real-time decision-making ability. 6G&#x2019;s large-scale connections make centralized security approaches inadequate. Blockchain-based security solutions offer a critical advantage at this point. Experiments have shown that AI-supported network management systems combined with blockchains increase 6G network performance by 25%.</p>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Case Studies and Applications</title>
<sec id="s5_1">
<label>5.1</label>
<title>Security for 6G</title>
<p>Billions of connected devices and sensors, where subnetworks may be operating in untrusted domains where there are expectations that the new types of security threats will be introduced to 6G. Even though there will be great benefits in speed, capacity and connectivity introduced in 6G networks, there will be some great security concerns with the integrations of Artificial Intelligence (AI), Internet of Things (IoT) devices, integrated systems into the network utilizing the power of 6G [<xref ref-type="bibr" rid="ref-60">60</xref>&#x2013;<xref ref-type="bibr" rid="ref-63">63</xref>]. Some key security concerns and mitigations as highlighted in <xref ref-type="table" rid="table-5">Table 5</xref> can minimize the risk and increase the security for 6G. <xref ref-type="table" rid="table-6">Table 6</xref> compares the new mechanisms offered by 6G in terms of security with 5G.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>6G basic security concerns &#x0026; mitigations [<xref ref-type="bibr" rid="ref-63">63</xref>]</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Security concerns</th>
<th>Mitigations</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data privacy and integrity</td>
<td>Encryption and anonymization</td>
</tr>
<tr>
<td>Network vulnerabilities</td>
<td>AI and machine learning for security</td>
</tr>
<tr>
<td>Advanced persistent threats (APTs)</td>
<td>Comprehensive security frameworks</td>
</tr>
<tr>
<td>Identity theft and fraud</td>
<td>User awareness and education</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Comparison of 6G and 5G security mechanisms</title>
</caption>
<table>
<colgroup>
<col/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Security criteria</th>
<th>5G security mechanisms</th>
<th>6G security mechanisms</th>
<th>Development area</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Identity management</bold></td>
<td>Centralized authentication (PKI (public key infrastructure), subscriber identity module (SIM)-based)</td>
<td>Decentralized blockchain-based authentication</td>
<td>Reducing centralization, secure access</td>
</tr>
<tr>
<td><bold>Encryption methods</bold></td>
<td>AES-256, ECDH</td>
<td>Quantum secure encryption (Lattice-based cryptography)</td>
<td>Resistance to quantum attacks</td>
</tr>
<tr>
<td><bold>Threat detection</bold></td>
<td>Traditional rule-based IDS (Intrusion Detection System)/IPS (Intrusion Prevention System)</td>
<td>AI-powered threat detection and autonomous security systems</td>
<td>Real-time attack detection</td>
</tr>
<tr>
<td><bold>Data integrity</bold></td>
<td>Centralized data management</td>
<td>Blockchain-based data storage and integrity verification</td>
<td>Decentralized and reliable data sharing</td>
</tr>
<tr>
<td><bold>Access control</bold></td>
<td>RAN-based access control</td>
<td>AI-powered dynamic access control mechanisms</td>
<td>Secure access to sensitive data</td>
</tr>
<tr>
<td><bold>Privacy protection</bold></td>
<td>Differential Privacy, basic anonymization</td>
<td>Privacy-focused AI training with Federated Learning</td>
<td>Decentralized data processing</td>
</tr>
<tr>
<td><bold>Attack prevention</bold></td>
<td>DDoS filtering, firewalls</td>
<td>AI-powered anomaly detection and autonomous attack prevention</td>
<td>Faster and more effective attack prevention</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s5_1_1">
<label>5.1.1</label>
<title>6G Network Architecture Security Concerns</title>
<p>6G security requires integrating physical, connection, and application layers to enhance security functions. The security requirements of 6G applications are complex due to their high communication needs and performance expectations, necessitating a careful balance of security and performance. The emphasis on zero trust (ZT) principles and adaptive security measures are critical for effectively combating emerging threats. Zero-trust architecture (ZTA) refers to the relationships between network entities, protocol processes, and access rules using the ZT concept. ZTA should be the foundation of 6G security architecture, focusing on adaptive collaboration among control domains to prevent malicious access behaviors such as DDoS attacks and malware propagation [<xref ref-type="bibr" rid="ref-64">64</xref>&#x2013;<xref ref-type="bibr" rid="ref-66">66</xref>]. Although an official standard for 6G has not yet been established, organizations such as ITU-T (ITU Telecommunication Standardization Sector), European Union projects, and NGMN (Next Generation Mobile Networks) define the vision and basic requirements of 6G.</p>
<p>ITU-T 2030 Vision</p>
<p>ITU-T&#x2019;s 6G vision envisions this technology to have the following critical components:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Faster connections will be provided with data rates of up to 1 Tbps.</p></list-item>
<list-item><label>&#x2B9A;</label><p>6G will enable instant data transmission with latency of less than 1 ms.</p></list-item>
<list-item><label>&#x2B9A;</label><p>6G will have an infrastructure that optimizes itself with AI-based decision mechanisms and can respond instantly to security threats.</p></list-item>
<list-item><label>&#x2B9A;</label><p>6G will include next-generation protocols that reduce carbon footprint and optimize energy consumption.</p></list-item>
</list></p>
<p>HEXA-X Project and European Union 6G Studies</p>
<p>EXA-X is a project funded by the European Union that determines the basic building blocks of 6G technology. Some of the critical issues that HEXA-X focuses on are:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Dynamic allocation of network resources with AI-supported communication protocols.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Creation of 6G&#x2019;s distributed security infrastructure using blockchain and AI.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Integration of technologies such as terahertz (THz) bands and reconfigurable intelligent surfaces (RIS) into 6G.</p></list-item>
</list></p>
<p>NGMN 6G Studies</p>
<p>NGMN Alliance serves as a platform that defines the basic requirements of 6G for mobile operators. Some of the basic requirements determined by NGMN are as follows:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>6G must have a scalable and flexible structure suitable for different usage scenarios.</p></list-item>
<list-item><label>&#x2B9A;</label><p>6G is intended to be used for critical tasks by supporting features such as ultra-reliable low-latency communication (URLLC).</p></list-item>
<list-item><label>&#x2B9A;</label><p>6G will offer a wide range of connectivity options for both IoT devices and human-centric services.</p></list-item>
</list></p>
<p>3GPP (3rd Generation Partnership Project) TR 23.288&#x2014;AI-Enabled Network Management
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>TR 23.288 defines how AI-enabled network management can be optimized and used in automation processes. In the context of 6G, AI-based network management will be critical for dynamic spectrum allocation and real-time security analysis.</p></list-item>
<list-item><label>&#x2B9A;</label><p>When AI is used to provide autonomous management of 6G networks, it can predict network outages in advance and allocate network resources in the most efficient way, in accordance with the principles set out in TR 23.288.</p></list-item>
</list></p>
<p>3GPP TR 28.809&#x2014;AI-Enabled Security and Network Optimization
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>TR 28.809 describes the role of AI in identifying, analyzing and preventing security threats. In 6G networks, it is suggested that AI will be combined with blockchain to provide decentralized threat management.</p></list-item>
<list-item><label>&#x2B9A;</label><p>TR 28.809 addresses how AI-based systems should be protected against attacks and what mechanisms can be developed against adversarial attacks. In the context of 6G, it is emphasized that AI-enabled security solutions should be secured with blockchain-based verification mechanisms.</p></list-item>
</list></p>
<p>3GPP TS 28.104&#x2014;AI-Enabled Network Automation
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>3GPP TS 28.104 includes recommendations for AI-based automatic network management and security protocols. This standard is a guide on how 6G networks can be made more secure and efficient with AI and blockchains.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI-supported network automation can detect threats with blockchain-based records by pre-determining malicious attacks. The role of AI in security for 6G is detailed based on this standard.</p></list-item>
</list></p>
</sec>
<sec id="s5_1_2">
<label>5.1.2</label>
<title>6G Security Goals &#x0026; Metrics</title>
<p>The goals and metrics on 6G security cover architecture, applications, technologies, policies, and standardization. It&#x2019;s very important to have a clear vision and goal with practical solutions to detect and resolve network attacks such as Zero-day attacks. In order to anticipate, detect, mitigate, and prevent security assaults as well as to restrict the spread of such vulnerabilities in 6G networks, it will be more crucial than ever to implement intelligent and adaptable security systems. Key Performance Indicators (KPIs) described in <xref ref-type="table" rid="table-7">Table 7</xref> will assist in fully accounting for the aspects of impact that transcend the purview of deterministic performance metrics.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>6G Security KPIs &#x0026; impact [<xref ref-type="bibr" rid="ref-67">67</xref>]</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>KPI</th>
<th>Description</th>
<th>6G impact</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Protection level</bold></td>
<td>The guarantee of protection from particular dangers and assaults.</td>
<td>Higher requirements due to widespread 6G usage and elevated risk levels.</td>
</tr>
<tr>
<td><bold>Response time (average, maximum, etc.)</bold></td>
<td>The duration needed for security mechanisms to address malicious activities.</td>
<td>Significantly reduced as 6G&#x2019;s faster pace allows attacks to escalate more quickly.</td>
</tr>
<tr>
<td><bold>Coverage</bold></td>
<td>The extent to which security measures protect 6G elements and functionalities.</td>
<td>Becomes more complex due to the diverse and highly distributed nature of 6G systems.</td>
</tr>
<tr>
<td><bold>Automaticity level</bold></td>
<td>The ability of security systems to act autonomously.</td>
<td>Easier to implement with widespread AI, but potential AI-related vulnerabilities could introduce risks.</td>
</tr>
<tr>
<td><bold>AI robustness</bold></td>
<td>The network&#x2019;s AI algorithm&#x2019;s ability to survive security threats.</td>
<td>Harder to ensure consistent reliability across the system but increasingly vital due to AI&#x2019;s prominence in 6G.</td>
</tr>
<tr>
<td><bold>Security AI model training time</bold></td>
<td>The amount of time needed for AI-based security models to settle and adjust.</td>
<td>Better hardware and more sophisticated AI/ML models are helpful, but complexity and data availability continue to be major obstacles.</td>
</tr>
<tr>
<td><bold>Security function chain latency</bold></td>
<td>The amount of time required for connected security procedures to run and react.</td>
<td>6G&#x2019;s decentralized architecture poses challenges, though device- and edge-centric solutions offer some relief.</td>
</tr>
<tr>
<td><bold>Deployment cost of security functions</bold></td>
<td>The financial cost of implementing and maintaining security measures.</td>
<td>Significantly higher due to the complexity, making it difficult to achieve desired performance levels.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>A summary of the 6G security threat landscape is given in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. Both public and private blockchain systems may have security problems. They result in issues including decreased system availability, loss of accuracy, and monetary losses in cryptocurrency. <xref ref-type="table" rid="table-8">Table 8</xref> is a list of some of the most significant security holes in smart contracts and blockchain systems. Before deployment, appropriate validation is required to detect semantic problems, use security tools, and carry out formal verification to prevent such security flaws. Strong authentication and access control procedures are also necessary to stop malicious bots and Sybil attacks.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Diagram of 6G security threat landscape</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-3.tif"/>
</fig><table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Blockchain 6G services security vulnerabilities [<xref ref-type="bibr" rid="ref-67">67</xref>]</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>No.</th>
<th>Vulnerability</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>The majority attack/51% attack</td>
<td>Malicious actors gain control over the majority of nodes to dominate the blockchain.</td>
</tr>
<tr>
<td>2</td>
<td>Double-spending attack</td>
<td>Reusing the same token multiple times fraudulently.</td>
</tr>
<tr>
<td>3</td>
<td>Re-entrancy attack</td>
<td>Exploiting smart contracts by repeatedly invoking another contract in a harmful way.</td>
</tr>
<tr>
<td>4</td>
<td>Sybil attacks</td>
<td>Gaining network control by creating numerous fake identities.</td>
</tr>
<tr>
<td>5</td>
<td>Authentication and access control flaws</td>
<td>Weaknesses in mechanisms for verifying identities and managing access rights.</td>
</tr>
<tr>
<td>6</td>
<td>Misconfigured security settings</td>
<td>Vulnerabilities are caused by outdated or improperly set security configurations.</td>
</tr>
<tr>
<td>7</td>
<td>Privacy breaches</td>
<td>Exposure of sensitive data, including user details and transaction information.</td>
</tr>
<tr>
<td>8</td>
<td>Miscellaneous vulnerabilities</td>
<td>Issues such as faulty contracts, random errors, and inefficient computations.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To stop privacy leaks in blockchain-based 6G services, privacy-preserving strategies like Trusted Execution Environments (TEE) and privacy by design should be incorporated. With varying security consequences, blockchain/DLT (Direct Linear Transformation) allows public, private, consortium, and hybrid systems. For example, 51% attacks pose a serious risk to public blockchains; hence, consortium or private blockchains may be better suited for some 6G applications, such as roaming or spectrum management, which require fewer miners. The appropriate selection of blockchain/DLT type can help mitigate the impact of specific attacks.</p>
</sec>
<sec id="s5_1_3">
<label>5.1.3</label>
<title>6G Blockchain Security Concerns</title>
<p>There are many potential opportunities for integrating blockchain technology into 6G applications. The following is a collection of security-related incidents that are offered in an analysis of the prospects and difficulties of blockchain implementation in 6G [<xref ref-type="bibr" rid="ref-68">68</xref>&#x2013;<xref ref-type="bibr" rid="ref-70">70</xref>].
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Intelligent Resource Management</p></list-item>
<list-item><label>&#x2B9A;</label><p>Elevated Security Features</p></list-item>
<list-item><label>&#x2B9A;</label><p>Industrial Applications</p></list-item>
<list-item><label>&#x2B9A;</label><p>Smart Healthcare</p></list-item>
<list-item><label>&#x2B9A;</label><p>Edge Models ML training Model</p></list-item>
<list-item><label>&#x2B9A;</label><p>Decentralized 6G Communications</p></list-item>
<list-item><label>&#x2B9A;</label><p>Authentication, Availability, Integrity</p></list-item>
</list></p>
<p>Decentralization, transparency with anonymity, provenance, and non-repudiation of transactions, immutability and tamper-proof distributed ledgers, and the removal of single points of failure are some of the most obvious characteristics, if properly implemented.</p>
</sec>
<sec id="s5_1_4">
<label>5.1.4</label>
<title>6G AI Security Threats</title>
<p>Expectations that enhancements of AI into 6G will minimize security risks, but the new threats will emerge as hackers will find new venues to penetrate the security holes in 6G using AI limitations.</p>
<p><xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows a summary of an AI-based system that explains:</p>

<p><list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Data Poisoning: Involves changing input objects or adding data with erroneous labels to datasets to trick ML systems.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Algorithm Poisoning: Uploads modified weights to local learning models in an attempt to interfere with the distributed learning process.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Model Poisoning: Substitutes a harmful model for the deployed one.</p></list-item>
</list></p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Diagram of 6G operated AI based security model with three attack methods and potential defense methods</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-4.tif"/>
</fig>
<p>Among these, data poisoning poses the greatest challenge because input objects in outdoor environments are widely accessible, enabling attackers to perform advanced manipulations easily. Addressing these threats requires a multi-layered security approach, including blockchain-based verifiable training, differential privacy techniques, adversarial robustness testing, and federated learning validation mechanisms.</p>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> shows an example of an attack that involves using a drone to trick AI-driven control systems in self-driving cars by projecting a fake traffic light image onto a road banner. Similarly, attackers can interfere with AI-based resource allocation systems by using data poisoning techniques, such as inserting false data into transfer or federated learning models [<xref ref-type="bibr" rid="ref-71">71</xref>]. Additionally, it is possible to fool AI-based facial recognition software into thinking that an attacker (John) is someone else (Lucy). With the increasing reliance on AI for critical applications like autonomous driving in 6G networks, these threats pose significant risks [<xref ref-type="bibr" rid="ref-72">72</xref>].</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Diagram of physical poisoning and algorithmic attacks on an AI enhanced 6G UAV (unmanned aerial vehicle)</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-5.tif"/>
</fig>
<p>There are several defense tactics that can be used to combat hostile threats to AI systems. By enhancing risk assessments and protecting the integrity of local data and AI models from attacks, technologies like blockchain and high-performance computing may be crucial in tackling AI security issues in the 6G future.</p>
<p>The vision for 6G includes significantly enhancing current AI protection methods through three main approaches:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Improving Data Quality: This includes methods like as lowering noise, altering data characteristics in adversarial samples, or sanitizing tainted data during training. Using verified data sources, such as blockchain-enabled supply chains with mutual authentication, is also recommended.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Model Protection: AI designers can implement measure like specialized detectors to block ongoing attacks or conduct multiple evaluations to verify the model&#x2019;s integrity.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Restoring Output Integrity: Ensures that the final output remain reliable despite adversarial attempts.</p></list-item>
</list></p>
<p>Overall, 6G technologies are expected to bolster AI defenses significantly.</p>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> shows simplified defense against algorithm poisoning involves detecting adversarial models by comparing predictions made on original and compressed (squeezed) input data. Significant differences between the results suggest that adversarial samples may have tainted the original input. To ensure output integrity during deployment, techniques like output obfuscation and prediction purification can be employed.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Diagram of defense for adversarial</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_64028-fig-6.tif"/>
</fig>
<p>In the 6G era, advanced methods for identifying vulnerabilities in AI-powered systems, such as model assessment and APIs for scanning weaknesses in AI services, are likely to be developed. The study of adversarial attacks and defenses in deep learning continues to be a significant focus for both academia and industry, emphasizing the need for ongoing research and innovation in AI security.</p>
<p>Since AI models are usually trained with large amounts of data, the security of this data is critical to the accuracy and reliability of AI. The following security risks and precautions that can be taken are detailed:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Malicious actors can cause the AI model to make incorrect predictions by adding harmful or incorrect information to the training data. It is recommended that the data be stored in a secure and immutable blockchain-based environment against such attacks.</p></list-item>
<list-item><label>&#x2B9A;</label><p>The data used in AI training may contain personal or sensitive information. Techniques such as Federated Learning can increase privacy by enabling decentralized processing of data.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI-based fraud detection systems can prevent the injection of fake data by identifying anomalies. AI and blockchain integration can be used to increase the accuracy of such systems.</p></list-item>
</list></p>
<p>AI models can be manipulated or stolen, especially by attackers. In this context, the following security threats have been addressed:
<list list-type="simple">
<list-item><label>&#x2B9A;</label><p>When the parameters of AI models are compromised, attackers can learn how the model works and use this information for malicious attacks. In order to reduce this risk, it is recommended that AI models be run in hardware-based secure environments.</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI models can be made to make incorrect predictions by making small but deliberate changes. For example, adversarial noise can be added to computer vision systems to cause AI to incorrectly recognize objects. Defense mechanisms include adversarial training and model compression techniques.</p></list-item>
<list-item><label>&#x2B9A;</label><p>Malicious code can be added during the update of AI models, creating security vulnerabilities. To prevent such risks, AI model updates can be made to go through blockchain-based verification processes.</p></list-item>
</list></p>
</sec>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Intelligent 6G Security and Forensics: The Role of GenAI</title>
<p>The emergence of 6G networks, defined by their unprecedented speed and seamless integration of IoT devices, offers transformative potential in domains such as autonomous systems, smart cities, and biomedical informatics. However, the exponential growth of connected devices introduces novel challenges, particularly in ensuring security and conducting digital forensics. Traditional forensic methods struggle to adapt to the vast and heterogeneous environments enabled by 6G, necessitating advanced AI-driven approaches that combine intelligence and scalability to effectively manage modern cyber investigations [<xref ref-type="bibr" rid="ref-73">73</xref>&#x2013;<xref ref-type="bibr" rid="ref-76">76</xref>].</p>
<p>Generative AI (GenAI) has emerged as a pivotal tool for securing 6G networks. Its ability to process vast amounts of real-time data facilitates the identification of anomalies and potential intrusions with unparalleled speed. By leveraging machine learning models, GenAI enables predictive analytics that anticipate vulnerabilities and mitigate threats before they can materialize [<xref ref-type="bibr" rid="ref-75">75</xref>]. Additionally, GenAI&#x2019;s capacity to correlate fragmented data streams plays a crucial role in reconstructing cyber incidents, making it indispensable for comprehensive forensic analysis in the distributed and dynamic 6G ecosystem [<xref ref-type="bibr" rid="ref-76">76</xref>,<xref ref-type="bibr" rid="ref-77">77</xref>]. Its integration with edge computing ensures localized, low-latency analysis for detecting threats at the source, which further enhances its forensic capabilities. These capabilities underscore GenAI&#x2019;s transformative potential in fortifying 6G networks against emerging threats.</p>
<p>However, the integration of GenAI into 6G security frameworks introduces its own set of vulnerabilities. Prompt injection attacks, where adversarial inputs manipulate AI-generated responses, pose significant risks to 6G applications. Similarly, threats such as data poisoning and model theft jeopardize the integrity of GenAI systems by compromising training datasets and enabling unauthorized access to sensitive architectures. Additionally, inference attacks, which deduce sensitive data from GenAI outputs, and supply chain threats affecting LLM plugins, present further challenges in securing 6G systems. These challenges necessitate robust frameworks like LLMSecOps, which emphasize secure development practices, adversarial training, and the application of differential privacy to safeguard GenAI deployments [<xref ref-type="bibr" rid="ref-77">77</xref>]. Moreover, the inclusion of blockchain technology within these frameworks offers immutable evidence storage, which further strengthens forensic reliability in 6G networks.</p>
<p>Despite its challenges, GenAI holds immense promise for enhancing 6G security and forensics. Its role extends beyond security, encompassing proactive mitigation strategies such as integrating GenAI with decentralized identity verification systems, which enables self-healing networks and automating responses to detecting anomalies. Its application in real-time threat detection, predictive analytics, and forensic investigations highlights its potential to address the limitations of traditional methods. To fully realize this potential, future research must focus on developing resilient GenAI models tailored to 6G environments, mitigating vulnerabilities outlined in the OWASP taxonomy, and integrating GenAI with blockchain for tamper-proof forensic evidence. By addressing these avenues, GenAI can establish itself as a cornerstone of intelligent 6G security and forensic frameworks, which ensures a secure and resilient digital future [<xref ref-type="bibr" rid="ref-77">77</xref>].</p>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Mobile Virtual Compute Environments and 6G</title>
<p>Easy access, high security, smart connectivity, integrated sensing, industrial IoT, deep learning network augmentation, AR/VR, and ultra-high wireless data transfer rates are all goals for the 6G wireless protocol [<xref ref-type="bibr" rid="ref-78">78</xref>&#x2013;<xref ref-type="bibr" rid="ref-80">80</xref>]. It is projected that ultra-high wireless data transfer rates will be in the terahertz (THz or 10<sup>12</sup> cycles per second) range. Distributed edge computing with high-speed and broad connections will be a critical part of realizing many of these goals. In turn, this gives opportunities for small headless virtual machines to play an important role in 6G. This allows mobile virtual compute environments to be easily migrated to enhance optimality or for other reasons. As central examples, virtual Raspberry Pis are very small virtualized headless computers. Here, virtual Raspberry Pis are proxies for any small virtual and headless devices made with off-the-shelf components. Such machines may play a significant role in 6G. The headless virtual machines of focus have small operating system images. These modest image sizes may be run on emulators seated on powerful and extensive physical systems serving the 6G network.</p>
<p>Headless computers have no persistent screen or keyboard attached to them. Headless computers are common in the cloud, where they are focused on delivering value. Juxtaposed to headless computers are personal mobile devices such as mobile phones and tablets. These devices have screens and keyboards or other human-geared data entry methods. Furthermore, AR/VR, holographic, and haptic systems may enhance immersive experiences. In addition to physically moving systems such as drones and vehicles.</p>
<p>Virtual machines (VMs) are software instantiations of physical machines. There are several types of virtualizations. Emulation is the imitation of all aspects of a system. All virtual emulation is done by VMMs (Virtual Machine Manager). VMMs run on hosts. The guest machine is the VM. VMMs perform several different types of emulation or virtualization. Full virtualization is complete software emulation of a physical machine. Hardware-assisted virtualization requires updates to the guest operating system so it can be emulated. Paravirtualization is the emulation of a physical machine by having a guest machine call subroutines on the host for emulation. In OS-level virtualization or containerization, the guest operating system shares major subsystems, i.e., the kernel, of the host operating system. Process-language virtualization is the virtualization of an abstract language-based machine. For example, the JVM, .NET framework, or Python3.</p>
<p>Virtual Raspberry Pi guests typically run on full virtualization, hardware assisted virtualization, or paravirtualization. In turn, these virtual machines can run a host of software tools. They can dynamically install new software when needed. They can participate in significant distributed computation. They can also have high speed and broad connectivity on the edge. For example, physical Raspberry Pis can transmit data through their RJ45 connectors at 1 GB/s, given a suitably fast connector. Where 6G wireless may be able to use THz wireless transmissions, which are anticipated to go as fast as 100 GB/s. Assuming a 1 THz wireless communication network for 6G, consider a virtualized Raspberry Pi. Since these virtual machines are not limited by RJ45s or, more significantly, their connecting cable&#x2019;s capacity, these virtual machines can run as fast as their VMMs and their software and hardware.</p>
<p>Non-Turing complete edge-systems or embedded systems are generally easier to virtualize than complete computers. Emulating these edge systems may help edge computing for 6G. In addition, there are software defined networks and network function virtualization [<xref ref-type="bibr" rid="ref-81">81</xref>]. Personal mobile devices are important endpoints on 6G wireless systems. Today, personal mobile devices leverage cloud systems. Though for many 6G applications, these mobile devices require high-speed and high bandwidth networking, so the cloud may not be ideal for communication or computational support. Along with reliable, high-speed, and high-capacity networking, a lot of computation can be done on the edge to enhance 6G applications. Indeed, the cloud will play a significant role in 6G, though it will be augmented by significant edge computing and edge networking. Particularly, to make 6G most effective, a great deal of edge computing will be necessary.</p>
<p>Initially, early applications of physical Raspberry Pis focused on education. Often, technologies focused on education find their way into significant application areas. Small virtual headless machines will likely follow the same path. Virtual Raspberry Pis and similar headless computers have significant potential for computing on the edge. Interestingly, on one hand, physical components may fail in short time spans. For instance, inexpensive SD cards or other components may fail within a year of use for physical Raspberry Pis. On the other hand, when the hardware is virtualized, there are no SD cards or other hardware issues to worry about. Of course, the systems emulating these machines have taken the responsibility of forestalling physical system failure. This means putting VMMs in several places on the edge. These VMMs emulate virtual machines. In this way, VMMs can be deployed for edge computing. VMMs on the edge have several advantages over physical devices: (1) a VM may be emulated by several differently located VMMs, (2) VMs may be dynamically migrated to several other edge locations or the cloud, (3) VMs may be horizontally scaled by cloning for scaling or failure resistance.</p>
<p>There are also potential issues for these VMMs. For example, VMMs are complex and sophisticated software systems requiring care and maintenance. VMMs run on a specific architecture and may require a lot of resources. VMMs often focus their emulation on specific ISAs (instruction set architectures) and systems. For example, VirtualBox emulates x86 machines, VMware emulates x86-64, Intel VT-x, and AMD-V (AMD Virtualization). QEMU emulates a host of systems, including various ARMs (Advanced RISC Machine) and x86 ISAs. QEMU machines can also take device-tree-blobs for describing systems. In many cloud data centers, OS-level VMs run on fully virtualized machines. These nested virtual machines add a level of abstraction and enhance flexibility. However, this can also cause a great deal of slowdown. For example, suppose an edge VMM runs an x86-64 emulator to run a fully virtualized machine M. Then, if M must run QEMU to emulate an ARM processor A, this may lead to software emulation of A while M may use hardware assisted virtualization, perhaps using VT-x or AMD-V, or paravirtualization. So, M may be efficiently emulated, but A not so much.</p>
<p>Also, bootability needs to be secured. Although physical access to computers or embedded systems can compromise security in any case. The UEFI (Unified Extensible Firmware Interface) unifies and offers a standard booting system for both computers and embedded systems [<xref ref-type="bibr" rid="ref-82">82</xref>]. UEFI is vulnerable when an attacker has physical access to a device. If a copy of a VM is obtained by an attacker, they may have full access to the UEFI instance. Hence, they may be able to circumvent a software version of UEFI.</p>
<p>There are security advantages for virtual Raspberry Pi computers [<xref ref-type="bibr" rid="ref-83">83</xref>]. The attributes that make small virtual machines useful include agility, clonability, migration, and ease of provisioning. They point out that VMs may also follow situations or individuals by migration. They can use blockchain/DTL (Data Control Language) [<xref ref-type="bibr" rid="ref-84">84</xref>]. These VMs can follow situations along the edge to invalidate deepfakes. For example, systems or mobile devices may benefit from mobile VMs following people or situations in several ways. Data describes situations or people, for example, via face recognition. Repeatedly validating face recognition with locations as a person of interest travels can have added value. Validating factors may be embedded into blockchains for permanence and verifiability.</p>
<p>VM migration can be done by checkpoint and restart [<xref ref-type="bibr" rid="ref-85">85</xref>,<xref ref-type="bibr" rid="ref-86">86</xref>]. Generally, this may lead to stopping the VM. Live VM migration is challenging [<xref ref-type="bibr" rid="ref-85">85</xref>]. Live VM migration moves live VMs from one VMM to another. In any case, it seems best for VMMs to be proactively available in destination locations. Process migration is more challenging due to residual dependencies [<xref ref-type="bibr" rid="ref-86">86</xref>]. These residual dependences include libraries, file handles, expected structures, etc. Standard process-language virtualization has language-based virtual machines. In this case, the developers and system admins must manage the process-language virtualization and its needs to ensure it transfers occur without residual dependencies. For instance, these process-language virtualization systems generally have serialization built into their languages. Serialization allows the conversion of objects or data structures for transportation or persistence. This alleviates some residual dependencies. Process-language virtualization may also be combined with container virtualization to include other dependencies.</p>
<p>At the same time, the terahertz wireless connections that are projected for 6G may allow fast live VM migration in the edge. Particularly, terahertz connections can move a terabit per second. So, moving 1 TB (TeraByte) will take up to a handful of seconds. Connections to major clouds can run at similar speeds.</p>
<p>Though the Cloud is susceptible to unanticipated congestion. Though the Cloud is very useful for very large-scale data sharing. Virtual Raspberry Pi&#x2019;s can be used to enhance security [<xref ref-type="bibr" rid="ref-83">83</xref>]. Small devices can be easily cloned or migrated. Residual dependencies are not an issue with VM migration. For instance, small Raspberry Pi operating system images currently range from 1/2 gigabyte for lite versions to under three gigabytes for full versions. Many ARM operating system images also have accompanying device-tree blobs for describing the hardware of an emulated system. These device-tree-blob files are quite small. Larger operating systems such as Ubuntu routinely have images of five or more gigabytes. Of course, some container-based operating system images, such as Alpine, require as little as five megabytes. No matter the size of the images, these operating systems may be run on large and high-resource hardware platforms.</p>
<p>Moving such virtual machines to, from, or around the edge can soak up a lot of resources. However, 6G networks allow these VMs to be moved easily. Images of these VMs can also be verified on blockchains using message-digest hash functions. Clonability allows horizontal and vertical scaling. Generally, cloning of based on fixed images and may require time to complete installations and booting. Horizontal scaling is done by cloning more virtual systems to enhance security when needed. Blockchains/DLT can be leveraged to record security incidents while the virtual Raspberry Pis are following the likely causes of incidents. Vertical scaling is resizing the system to help with anticipated or actual issues. Small devices can also be provisioned in many useful ways. Significantly, Anwar et al. [<xref ref-type="bibr" rid="ref-79">79</xref>] discuss applications of small virtual devices for investigations.</p>
<p>Virtual machines can migrate for many reasons, as well. For example, small virtual machines may follow mobile devices on the edge. This allows computation to continue on the edge even when connectivity may not be consistent. Specifically, as the demands on 6G subnets evolve, virtual machines can migrate to more optimal locations.</p>
<p>Particularly Ref. [<xref ref-type="bibr" rid="ref-84">84</xref>] shows how to build (insecure) blockchain-like systems on virtual Raspberry Pis. These systems illustrate that small, constrained devices can participate in the security aspects of a secure blockchain. Perhaps building a side chain that is in an isolated, secure location on the edge.</p>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Challenges and Future Perspectives</title>
<p>Although AI and blockchain clustering have great potential to improve the security of 6G networks, the implementation and integration of these technologies pose several challenges. In this section, we address these challenges and shed light on future research directions. The challenges and future perspectives, as outlined in <xref ref-type="table" rid="table-9">Table 9</xref>, highlight key issues that need to be addressed for the successful implementation of AI and blockchain clustering technologies to enhance security in 6G networks.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>The challenges and future perspectives in 6G networks</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Challenge</th>
<th>Description</th>
<th>Future perspectives</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Scalability</bold></td>
<td>The scalability of blockchain technology is a major concern, especially in large-scale 6G networks. As the size of the blockchain network increases, transaction verification and block addition times also increase, which can negatively affect network performance.</td>
<td>Development of more efficient consensus mechanisms (e.g., Proof-of-Stake)<break/>Use of Layer-2 scaling solutions (e.g., Lightning Network)<break/>Partitioning the blockchain network into smaller pieces using techniques such as sharding</td>
</tr>
<tr>
<td><bold>Privacy</bold></td>
<td>Blockchain technology can bring privacy concerns due to the transparent recording of all transactions. It is important to develop privacy mechanisms to protect sensitive data in 6G networks.</td>
<td>Use of advanced cryptographic techniques such as zero-knowledge proofs and homomorphic encryption<break/>Development of privacy-preserving machine learning techniques<break/>Use of data anonymization and obfuscation techniques</td>
</tr>
<tr>
<td><bold>Computational complexity</bold></td>
<td>Artificial intelligence algorithms, especially deep learning models, can require high computational power. This can make it difficult for resource-constrained devices to join 6G networks.</td>
<td>Development of more efficient AI algorithms<break/>Use of technologies such as edge computing and cloud computing<break/>Use of hardware acceleration techniques C28 (e.g., Graphics Processing Units (GPUs))</td>
</tr>
<tr>
<td><bold>Energy consumption</bold></td>
<td>The energy consumption of blockchain and AI technologies can be a significant problem, especially for mobile devices. New solutions should be developed to improve energy efficiency in 6G networks.</td>
<td>Development of energy-efficient blockchain consensus mechanisms<break/>Design of less energy-consuming AI algorithms<break/>Use of technologies such as energy harvesting and wireless power transfer</td>
</tr>
<tr>
<td><bold>Standardization</bold></td>
<td>The lack of standards for the use of AI and blockchain technologies in 6G networks can lead to compatibility issues between different systems.</td>
<td>Creation of standards by standards development organizations (e.g., 3GPP, IEEE(Institute of Electrical and Electronics Engineers))<break/>Development of open-source software and hardware platforms<break/>Encouragement of industrial collaboration and knowledge sharing</td>
</tr>
<tr>
<td><bold>Security vulnerabilities</bold></td>
<td>AI and blockchain technologies can have their own vulnerabilities. For example, AI models can be vulnerable to adversarial attacks, while blockchain networks can be exposed to 51% attacks.</td>
<td>To improve the security of AI models<break/>Developing new consensus mechanisms and cryptographic techniques to increase the security of blockchain networks<break/>Using continuous monitoring and auditing mechanisms to detect and fix security vulnerabilities</td>
</tr>
<tr>
<td><bold>Data quality</bold></td>
<td>The performance of AI algorithms depends on the quality of the data they are trained on. It is important to develop high-quality data collection and labeling mechanisms in 6G networks.</td>
<td>Using data cleaning and preprocessing techniques to improve data quality<break/>Using distributed data storage and management systems<break/>Developing incentive mechanisms to encourage data sharing and collaboration</td>
</tr>
<tr>
<td><bold>Legal and ethical issues</bold></td>
<td>The use of AI and blockchain technologies may raise a number of legal and ethical questions, such as biased decisions made by AI algorithms or the use of blockchain technology for illegal activities.</td>
<td>Developing legal frameworks and regulations to ensure ethical use of AI and blockchain technologies<break/>Creating mechanisms to promote transparency and accountability<break/>Carrying out education and information activities to raise awareness in society and encourage ethical discussions</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s6_1">
<label>6.1</label>
<title>Challenges</title>
<p><list list-type="simple">
<list-item><label>&#x2B9A;</label><p>The scalability of blockchain technology is a significant challenge, especially considering the large data volumes and high transaction speeds in 6G networks. Blockchain clustering can help alleviate this problem, but new methods need to be developed to ensure efficient and secure communication between different blockchains [<xref ref-type="bibr" rid="ref-87">87</xref>,<xref ref-type="bibr" rid="ref-88">88</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI algorithms often require large amounts of data, which can raise privacy concerns. To exploit the potential of AI while preserving privacy in 6G networks, the use of privacy-preserving AI techniques such as federated learning (FL) is gaining importance [<xref ref-type="bibr" rid="ref-89">89</xref>,<xref ref-type="bibr" rid="ref-90">90</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI models can be particularly vulnerable to adversarial attacks. When using AI for 6G security, it is critical to develop models that are resilient to attacks such as adversarial examples and data poisoning [<xref ref-type="bibr" rid="ref-91">91</xref>,<xref ref-type="bibr" rid="ref-92">92</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>Blockchain and AI techniques can cause high energy consumption, which can be especially important for resource-constrained devices. To increase energy efficiency in 6G networks, it is necessary to develop new algorithms and hardware designs that optimize energy consumption [<xref ref-type="bibr" rid="ref-93">93</xref>,<xref ref-type="bibr" rid="ref-94">94</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>Standards are needed to ensure interoperability between different AI and blockchain platforms. Collaboration between standards development organizations and industry partners is important to facilitate harmonization and integration in the 6G ecosystem [<xref ref-type="bibr" rid="ref-95">95</xref>,<xref ref-type="bibr" rid="ref-96">96</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>The use of AI and blockchain technologies raises legal and ethical issues such as data privacy, liability, and bias. It is necessary to develop legal frameworks and ethical rules to ensure the responsible and ethical use of these technologies in 6G networks [<xref ref-type="bibr" rid="ref-97">97</xref>,<xref ref-type="bibr" rid="ref-98">98</xref>].</p></list-item>
</list></p>
</sec>
<sec id="s6_2">
<label>6.2</label>
<title>Future Perspectives</title>
<p><list list-type="simple">
<list-item><label>&#x2B9A;</label><p>Hybrid solutions that combine different AI techniques (e.g., deep learning, reinforcement learning) and blockchain clustering methods can further improve 6G security. Such solutions can provide more comprehensive and effective protection against different security threats [<xref ref-type="bibr" rid="ref-99">99</xref>,<xref ref-type="bibr" rid="ref-100">100</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>The rise of quantum computing threatens existing cryptographic algorithms. To ensure the long-term security of 6G networks, it is necessary to develop new blockchain technologies that are resistant to quantum computers [<xref ref-type="bibr" rid="ref-101">101</xref>,<xref ref-type="bibr" rid="ref-102">102</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>AI can be used to optimize blockchain performance and scalability. For example, AI algorithms can improve blockchain efficiency by optimizing block size, mining difficulty, and transaction fees [<xref ref-type="bibr" rid="ref-103">103</xref>,<xref ref-type="bibr" rid="ref-104">104</xref>].</p></list-item>
<list-item><label>&#x2B9A;</label><p>Open-source platforms can accelerate the development and adoption of AI and blockchain technologies for 6G security. These platforms can support innovation by encouraging collaboration between researchers and developers [<xref ref-type="bibr" rid="ref-105">105</xref>,<xref ref-type="bibr" rid="ref-106">106</xref>]. AI and blockchain clustering offer a powerful synergy for securing 6G wireless networks. Continued research and development efforts are needed to fully realize the potential of these technologies and overcome the challenges we face.</p></list-item>
</list></p>
</sec>
<sec id="s6_3">
<label>6.3</label>
<title>6G Security Challenges&#x2014;Research Focus</title>
<p>6G still faces major security challenges as highlighted in <xref ref-type="table" rid="table-10">Table 10</xref> [<xref ref-type="bibr" rid="ref-72">72</xref>].</p>
<table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>Major security challenges [<xref ref-type="bibr" rid="ref-72">72</xref>]</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="left" width="120mm"/>
</colgroup>
<thead>
<tr>
<th>Challenges</th>
<th>Highlights</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Automated software creation</bold></td>
<td>Vulnerable software is a major contributor to security problems in modern networks and IT systems.<break/>Software complexity and variety will increase significantly, expanding the attack surface and creating multiple security challenges.<break/>Integrating AI/ML into the software development process adds numerous common defects since current AI/ML approaches are still in their infancy and fragmented.<break/>It&#x2019;s still difficult to fully utilize AI/ML for safe, highly automated software development.</td>
</tr>
<tr>
<td><bold>Automated security operations</bold></td>
<td>Automation based AI/ML has a lot of potential to solve today&#x2019;s problems and move toward more sophisticated, self-adjusting, and all-encompassing orchestration and management systems.<break/>AI/ML can improve network security, but it poses new threats as well. The two main challenges are:<list list-type="simple">
<list-item>
<label>&#x25AA;</label><p>Preparing for possible AI/ML-driven assaults.</p></list-item>
<list-item>
<label>&#x25AA;</label><p>Protecting AI/ML systems from targeted attacks while maintaining their explainability and reliability.</p></list-item>
</list><break/>The scope and impact of AI/ML-based attacks are still unpredictable.<break/>To properly respond and safeguard 6G networks, it is imperative to continuously monitor advances in Automated Security Operations.</td>
</tr>
<tr>
<td><bold>Privacy preserving technologies</bold></td>
<td>Large datasets, frequently gathered from diverse sources across multiple domains, are necessary for AI/ML techniques to create accurate models. Large volumes of sensitive data are produced in 6G networks with high-precision location and network sensing.<break/>It&#x2019;s difficult to protect data&#x2019;s privacy and confidentiality from outside threats and to minimize the amount of private information shared between parties in order to provide 6G services.<break/>6G&#x2019;s enormous and ongoing data creation, a strong framework for data processing, and protecting privacy is crucial. The goals of the framework should be to regulate and keep an eye on data access and flows.<break/>New approaches that make use of edge processing, federated learning, and distributed 6G Het-cloud (heterogeneous-cloud) are required for overseeing and implementing adaptable data security and privacy regulations.<break/>Resolving performance issues improves data privacy.</td>
</tr>
<tr>
<td><bold>Hardware &#x0026; cloud embedded anchors of trust</bold></td>
<td>Hardware-based trust anchors and embedded security are essential components of a dependable 6G system.<break/>6G challenges of adapting per-server attestation to virtualization and container technologies, and making it work with the very flexible and dynamic network deployment of the het-cloud, even though it is effective in today&#x2019;s networks.</td>
</tr>
<tr>
<td><bold>Quantum safe security</bold></td>
<td>Research has already advanced significantly in the field of quantum-safe cryptography methods, producing several intriguing algorithm options that still need to be developed to their full potential.<break/>The amount of work needed to modify current security protocols to accommodate these novel algorithms and come to an agreement on them through an open standardization process should not be underestimated.</td>
</tr>
<tr>
<td><bold>Jamming protection and physical layer security</bold></td>
<td>To provide a secure 6G radio interface without compromising key performance indicators (KPIs), including latency, throughput, and energy efficiency, physical layer security (PLS) approaches should be researched.<break/>PLS can offer verified security, in contrast to cryptographic methods that depend on presumptions about the intricacy of particular procedures. It is nevertheless difficult to maintain the theoretical security characteristics in real-world implementations that satisfy the exacting specifications of 6G use cases and protect against highly skilled attackers.<break/>There is a trade-off between providing resilience to jamming and optimizing spectral efficiency, defending against jamming presents another key challenge.<break/>The scientific community has not yet created a complete solution for malicious jamming, despite the identification of certain promising strategies.<break/>Further investigation is required to guarantee a crucial high degree of availability required by critical 6G services.</td>
</tr>
<tr>
<td><bold>Distributed Ledger Technologies (DLT)</bold></td>
<td>The limitations of distributed ledger technologie&#x2019;s scalability, energy efficiency, and latency would be a significant barrier to real-world deployments, despite the fact that they provide a helpful framework for expediting the establishment of trust across various operator domains, enhancing use cases for the 6G era, and encouraging cumulative trust building based on verified device behavior.<break/>Future work is expected to concentrate on improving the scalability and quantum safety of DLT consensus algorithms while preserving reasonable latency and energy costs.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion</title>
<p>This article examines the potential of integrating AI and blockchain clustering to enhance security in 6G wireless networks. The promise of unprecedented speed, capacity, and connectivity of 6G also brings with it increased security risks and challenges. Traditional security mechanisms are inadequate for coping with the distributed and dynamic nature of 6G networks. Therefore, new and innovative solutions such as AI, blockchains, and mobile virtual devices are required to address vulnerabilities and ensure reliable and secure communication in 6G networks.</p>
<p>While AI offers the ability to detect anomalies, predict attacks, and dynamically adapt security measures, blockchains increase trust and transparency by providing a decentralized and immutable architecture. The synergistic integration of these two technologies can significantly improve security in 6G networks. In our study, we discussed in detail blockchain clustering methods (federations, sidechains, sharding) and various AI techniques (machine learning, deep learning, reinforcement learning) that can be applied to 6G security. We have shown that the integration of these technologies can provide significant benefits such as improved threat detection, secure identity management, reliable data sharing, and distributed, resilient infrastructure. We also addressed the challenges facing AI and blockchain integration. Scalability, privacy, reliability, energy consumption, standardization, and legal/ethical issues are obstacles to the widespread adoption of these technologies in 6G networks. We identified future research directions to overcome these challenges: hybrid AI and blockchain solutions, quantum-resistant blockchain, AI-based blockchain optimization, mobile virtual compute environments, and open-source platforms.</p>
<p>In conclusion, AI and blockchain clustering offer a promising future for 6G security. The synergistic use of these technologies will play a key role in ensuring security and privacy in future wireless networks. However, to fully realize this potential, continuous collaboration and innovation between researchers, industry, and standards development organizations are required. We hope that this paper will be a valuable resource for researchers, engineers, and policymakers working in the field of 6G security.</p>
</sec>
</body>
<back>
<ack>
<p>Not applicable.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm their contribution to the paper as follows: study conception and design: A. F. M. Shahen Shah; data collection: A. F. M. Shahen Shah and Muhammet Ali Karabulut; analysis and interpretation of results: A. F. M. Shahen Shah, Muhammet Ali Karabulut, Abu Kamruzzaman, Dalal Alharthi, and Phillip G. Bradford; draft manuscript preparation: A. F. M. Shahen Shah, Muhammet Ali Karabulut, Abu Kamruzzaman, Dalal Alharthi, and Phillip G. Bradford. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shah</surname> <given-names>AFMS</given-names></string-name>, <string-name><surname>Qasim</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Karabulut</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Ilhan</surname> <given-names>H</given-names></string-name>, <string-name><surname>Islam</surname> <given-names>MB</given-names></string-name></person-group>. <article-title>Survey and performance evaluation of multiple access schemes for next-generation wireless communication systems</article-title>. <source>IEEE Access</source>. <year>2021</year>;<volume>9</volume>:<fpage>113428</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2021.3104509</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Shah</surname> <given-names>AFMS</given-names></string-name></person-group>. <article-title>A survey from 1G to 5G including the advent of 6G: architectures, multiple access techniques, and emerging technologies</article-title>. In: <conf-name>Proceedings of the IEEE 12th Annual Computing and Communication Workshop and Conference</conf-name>; <year>2022 Jan 26&#x2013;29</year>; <publisher-loc>Las Vegas, NV, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nguyen</surname> <given-names>V</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>P</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>B</given-names></string-name>, <string-name><surname>Hwang</surname> <given-names>R</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Security and privacy for 6G: a survey on prospective technologies and challenges</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2021</year>;<volume>23</volume>(<issue>4</issue>):<fpage>2384</fpage>&#x2013;<lpage>428</lpage>. doi:<pub-id pub-id-type="doi">10.1109/comst.2021.3108618</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ding</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lei</surname> <given-names>X</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>6G wireless networks: vision, requirements, architecture, and key technologies</article-title>. <source>IEEE Veh Technol Mag</source>. <year>2019</year>;<volume>14</volume>(<issue>3</issue>):<fpage>28</fpage>&#x2013;<lpage>41</lpage>. doi:<pub-id pub-id-type="doi">10.1109/mvt.2019.2921208</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name></person-group>. <article-title>Security and privacy in 6G networks: new areas and new challenges</article-title>. <source>Digit Commun Netw</source>. <year>2020</year>;<volume>6</volume>(<issue>3</issue>):<fpage>281</fpage>&#x2013;<lpage>91</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.dcan.2020.07.003</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Giordani</surname> <given-names>M</given-names></string-name>, <string-name><surname>Polese</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mezzavilla</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rangan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zorzi</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Toward 6G networks: use cases and technologies</article-title>. <source>IEEE Commun Mag</source>. <year>2020</year>;<volume>58</volume>(<issue>3</issue>):<fpage>55</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.1109/mcom.001.1900411</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dhar Dwivedi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kaushik</surname> <given-names>K</given-names></string-name>, <string-name><surname>Rao Mukkamala</surname> <given-names>R</given-names></string-name>, <string-name><surname>Alnumay</surname> <given-names>WS</given-names></string-name></person-group>. <article-title>Blockchain and artificial intelligence for 5G-enabled Internet of Things: challenges, opportunities, and solutions</article-title>. <source>Trans Emerg Tel Tech</source>. <year>2024</year>;<volume>35</volume>(<issue>4</issue>):<fpage>e4329</fpage>. doi:<pub-id pub-id-type="doi">10.1002/ett.4329</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ziyi</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Oluwakayode</surname> <given-names>O</given-names></string-name>, <string-name><surname>Hao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Lei</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Muhammad</surname> <given-names>I</given-names></string-name></person-group>. <article-title>AI and blockchain enabled future wireless networks: a survey and outlook</article-title>. <source>Distrib Ledger Technol</source>. <year>2024</year>;<volume>3</volume>(<issue>3</issue>):<fpage>30</fpage>. doi:<pub-id pub-id-type="doi">10.1145/3644369</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zuo</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>N</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name></person-group>. <article-title>A survey of blockchain and artificial intelligence for 6G wireless communications</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2023</year>;<volume>25</volume>(<issue>4</issue>):<fpage>2494</fpage>&#x2013;<lpage>528</lpage>. doi:<pub-id pub-id-type="doi">10.1109/comst.2023.3315374</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ji</surname> <given-names>B</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Song</surname> <given-names>K</given-names></string-name>, <string-name><surname>Li</surname> <given-names>C</given-names></string-name>, <string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Menon</surname> <given-names>VG</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A survey of computational intelligence for 6G: key technologies, applications and trends</article-title>. <source>IEEE Trans Ind Inform</source>. <year>2021</year>;<volume>17</volume>(<issue>10</issue>):<fpage>7145</fpage>&#x2013;<lpage>54</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tii.2021.3052531</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pathak</surname> <given-names>V</given-names></string-name>, <string-name><surname>Pandya</surname> <given-names>RJ</given-names></string-name>, <string-name><surname>Bhatia</surname> <given-names>V</given-names></string-name>, <string-name><surname>Lopez</surname> <given-names>OA</given-names></string-name></person-group>. <article-title>Qualitative survey on artificial intelligence integrated blockchain approach for 6G and beyond</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>105935</fpage>&#x2013;<lpage>81</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2023.3319083</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Velliangiri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Manoharan</surname> <given-names>R</given-names></string-name>, <string-name><surname>Ramachandran</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rajasekar</surname> <given-names>V</given-names></string-name></person-group>. <article-title>Blockchain based privacy preserving framework for emerging 6G wireless communications</article-title>. <source>IEEE Trans Ind Inf</source>. <year>2022</year>;<volume>18</volume>(<issue>7</issue>):<fpage>4868</fpage>&#x2013;<lpage>74</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tii.2021.3107556</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>P</given-names></string-name>, <string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>K</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>G</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>An intelligent wireless transmission toward 6G</article-title>. <source>Intell Converg Netw</source>. <year>2021</year>;<volume>2</volume>(<issue>3</issue>):<fpage>244</fpage>&#x2013;<lpage>57</lpage>. doi:<pub-id pub-id-type="doi">10.23919/icn.2021.0017</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mao</surname> <given-names>B</given-names></string-name>, <string-name><surname>Tang</surname> <given-names>F</given-names></string-name>, <string-name><surname>Kawamoto</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kato</surname> <given-names>N</given-names></string-name></person-group>. <article-title>AI models for green communications towards 6G</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2022</year>;<volume>24</volume>(<issue>1</issue>):<fpage>210</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.1109/comst.2021.3130901</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Fu</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Towards secure and efficient integration of blockchain and 6G networks</article-title>. <source>PLoS One</source>. <year>2024</year>;<volume>19</volume>(<issue>4</issue>):<fpage>e0302052</fpage>. doi:<pub-id pub-id-type="doi">10.1371/journal.pone.0302052</pub-id>; <pub-id pub-id-type="pmid">38603725</pub-id></mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kamal</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>V</given-names></string-name>, <string-name><surname>Seema</surname></string-name>, <string-name><surname>Sharma</surname> <given-names>MK</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Idrisi</surname> <given-names>MJ</given-names></string-name></person-group>. <article-title>A systematic review of blockchain technology assisted with artificial intelligence technology for networks and communication systems</article-title>. <source>J Comput Netw Commun</source>. <year>2024</year>;<volume>2024</volume>(<issue>1</issue>):<fpage>979371</fpage>. doi:<pub-id pub-id-type="doi">10.1155/2024/9979371</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Bargavi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Dadhich</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Exploring the integration of blockchain in 6G networks for improved security and efficiency</article-title>. In: <conf-name>Proceedings of the 2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)</conf-name>; <year>2024 Jan 29&#x2013;30</year>; <publisher-loc>Debre Tabor, Ethiopia</publisher-loc>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alanhdi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Toka</surname> <given-names>L</given-names></string-name></person-group>. <article-title>A survey on integrating edge computing with AI and blockchain in maritime domain, aerial systems, IoT, and Industry 4.0</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>28684</fpage>&#x2013;<lpage>709</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3465274</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Rustemi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Dalipi</surname> <given-names>F</given-names></string-name>, <string-name><surname>Atanasovski</surname> <given-names>V</given-names></string-name>, <string-name><surname>Risteski</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Enhancing academic credentials: the synergy of blockchain and artificial intelligence</article-title>. In: <conf-name>Proceedings of the 2024 7th International Balkan Conference on Communications and Networking (BalkanCom)</conf-name>; <year>2024 Jun 3&#x2013;6</year>; <publisher-loc>Ljubljana, Slovenia</publisher-loc>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhat</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Sofi</surname> <given-names>IB</given-names></string-name>, <string-name><surname>Chi</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities</article-title>. <source>IEEE Access</source>. <year>2020</year>;<volume>8</volume>:<fpage>205340</fpage>&#x2013;<lpage>73</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2020.3037108</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>P</given-names></string-name>, <string-name><surname>Guizani</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Blockchain-based secure communication of internet of things in space-air&#x2013;ground integrated network</article-title>. <source>Future Gener Comput Syst</source>. <year>2024</year>;<volume>158</volume>:<fpage>391</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2024.04.024</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ning</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Song</surname> <given-names>C</given-names></string-name>, <string-name><surname>Li</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Xie</surname> <given-names>J</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Blockchain-based federated learning: a survey and new perspectives</article-title>. <source>Appl Sci</source>. <year>2024</year>;<volume>14</volume>(<issue>20</issue>):<fpage>9459</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app14209459</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A novel 6G scalable blockchain clustering-based computer vision character detection for mobile images</article-title>. <source>Comput Mater Contin</source>. <year>2024</year>;<volume>78</volume>(<issue>3</issue>):<fpage>3041</fpage>&#x2013;<lpage>70</lpage>. doi:<pub-id pub-id-type="doi">10.32604/cmc.2023.045741</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pajooh</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Demidenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Aslam</surname> <given-names>S</given-names></string-name>, <string-name><surname>Harris</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Blockchain and 6G-enabled IoT</article-title>. <source>Inventions</source>. <year>2022</year>;<volume>7</volume>(<issue>4</issue>):<fpage>109</fpage>. doi:<pub-id pub-id-type="doi">10.3390/inventions7040109</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pal</surname> <given-names>S</given-names></string-name>, <string-name><surname>Dorri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jurdak</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Blockchain for IoT access control: recent trends and future research directions</article-title>. <source>J Netw Comput Appl</source>. <year>2022</year>;<volume>203</volume>:<fpage>103371</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jnca.2022.103371</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dorri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mishra</surname> <given-names>S</given-names></string-name>, <string-name><surname>Jurdak</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Vericom: a verification and communication architecture for IoT-based blockchain</article-title>. <source>Ad Hoc Netw</source>. <year>2022</year>;<volume>133</volume>:<fpage>102882</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.adhoc.2022.102882</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Elli</surname> <given-names>A</given-names></string-name>, <string-name><surname>Barger</surname> <given-names>A</given-names></string-name>, <string-name><surname>Bortnikov</surname> <given-names>V</given-names></string-name>, <string-name><surname>Cachin</surname> <given-names>C</given-names></string-name>, <string-name><surname>Christidis</surname> <given-names>K</given-names></string-name>, <string-name><surname>De Caro</surname> <given-names>A</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Hyperledger fabric: a distributed operating system for permissioned blockchains</article-title>. In: <conf-name>Proceedings of the Thirteenth EuroSys Conference</conf-name>; <year>2018 Apr 23&#x2013;26</year>; <publisher-loc>Porto, Portugal</publisher-loc>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="other"><article-title>Liquid Network [Online]</article-title>. [cited 2025 Jan 25]. Available from: <ext-link ext-link-type="uri" xlink:href="https://blockstream.com/liquid/">https://blockstream.com/liquid/</ext-link>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="other"><article-title>Stacks foundation. Level 2 Stacks chain on the Bitcoin Blockchain [Online]</article-title>. [cited 2025 Mar 18]. Available from: <ext-link ext-link-type="uri" xlink:href="https://stacks.org/">https://stacks.org/</ext-link>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="other"><article-title>Secure A. The zilliqa project: a secure, scalable blockchain platform [Online]</article-title>. [cited 2025 Jan 25]. Available from: <ext-link ext-link-type="uri" xlink:href="https://docs.zilliqa.com/positionpaper.pdf">https://docs.zilliqa.com/positionpaper.pdf</ext-link>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Kwon</surname> <given-names>J</given-names></string-name>, <string-name><surname>Buchman</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Cosmos whitepaper, a network of distributed ledgers [Online]</article-title>. [cited 2025 Jan 25]. Available from: <ext-link ext-link-type="uri" xlink:href="https://wikibitimg.fx994.com/attach/2020/12/16623142020/WBE16623142020_55300.pdf">https://wikibitimg.fx994.com/attach/2020/12/16623142020/WBE16623142020_55300.pdf</ext-link>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shamsan</surname> <given-names>SAM</given-names></string-name></person-group>. <article-title>Blockchain for secure and decentralized artificial intelligence in cybersecurity: a comprehensive review</article-title>. <source>Blockchain Res Appl</source>. <year>2024</year>;<volume>5</volume>(<issue>3</issue>):<fpage>100193</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.bcra.2024.100193</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nguyen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Gia</surname> <given-names>TN</given-names></string-name></person-group>. <article-title>Exploring the integration of edge computing and blockchain IoT: principles, architectures, security, and applications</article-title>. <source>J Netw Comput Appl</source>. <year>2024</year>;<volume>226</volume>:<fpage>103884</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jnca.2024.103884</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alhammadi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shayea</surname> <given-names>I</given-names></string-name>, <string-name><surname>El-Saleh</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Azmi</surname> <given-names>MH</given-names></string-name>, <string-name><surname>Ismail</surname> <given-names>ZH</given-names></string-name>, <string-name><surname>Kouhalvandi</surname> <given-names>L</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Artificial intelligence in 6G wireless networks: opportunities, applications, and challenges</article-title>. <source>Int J Intell Syst</source>. <year>2024</year>;<volume>2024</volume>:<fpage>1</fpage>&#x2013;<lpage>27</lpage>. doi:<pub-id pub-id-type="doi">10.1155/2024/8845070</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Patil</surname> <given-names>A</given-names></string-name>, <string-name><surname>Iyer</surname> <given-names>S</given-names></string-name>, <string-name><surname>Pandya</surname> <given-names>RJ</given-names></string-name></person-group>. <article-title>A survey of machine learning algorithms for 6G wireless networks</article-title>. <comment>arXiv:2203.08429v1. 2022</comment>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chinnasamy</surname> <given-names>P</given-names></string-name>, <string-name><surname>Babu</surname> <given-names>GC</given-names></string-name>, <string-name><surname>Ayyasamy</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Amutha</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sinha</surname> <given-names>K</given-names></string-name>, <string-name><surname>Balaram</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Blockchain 6G-based wireless network security management with optimization using machine learning techniques</article-title>. <source>Sensors</source>. <year>2024</year>;<volume>24</volume>(<issue>18</issue>):<fpage>6143</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s24186143</pub-id>; <pub-id pub-id-type="pmid">39338888</pub-id></mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sakr</surname> <given-names>HA</given-names></string-name>, <string-name><surname>Fouda</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Ashour</surname> <given-names>AF</given-names></string-name>, <string-name><surname>Abdelhafeez</surname> <given-names>A</given-names></string-name>, <string-name><surname>El-Afifi</surname> <given-names>MI</given-names></string-name>, <string-name><surname>Abdellah</surname> <given-names>MR</given-names></string-name></person-group>. <article-title>Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems</article-title>. <source>Egypt Inform J</source>. <year>2024</year>;<volume>28</volume>:<fpage>100540</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eij.2024.100540</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alwahedi</surname> <given-names>F</given-names></string-name>, <string-name><surname>Aldhaheri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ferrag</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Battah</surname> <given-names>A</given-names></string-name>, <string-name><surname>Tihanyi</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Machine learning techniques for IoT security: current research and future vision with generative AI and large language models</article-title>. <source>Internet Things Cyber-Phys Syst</source>. <year>2024</year>;<volume>4</volume>:<fpage>167</fpage>&#x2013;<lpage>85</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iotcps.2023.12.003</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Uysal</surname> <given-names>DT</given-names></string-name>, <string-name><surname>Yoo</surname> <given-names>PD</given-names></string-name>, <string-name><surname>Taha</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Data-driven malware detection for 6G networks: a survey from the perspective of continuous learning and explainability via visualisation</article-title>. <source>IEEE Open J Veh Technol</source>. <year>2023</year>;<volume>4</volume>:<fpage>61</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ojvt.2022.3219898</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Adawadkar</surname> <given-names>AMK</given-names></string-name>, <string-name><surname>Kulkarni</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Cyber-security and reinforcement learning&#x2014;a brief survey</article-title>. <source>Eng Appl Artif Intell</source>. <year>2022</year>;<volume>114</volume>:<fpage>105116</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.engappai.2022.105116</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Puspitasari</surname> <given-names>AA</given-names></string-name>, <string-name><surname>An</surname> <given-names>TT</given-names></string-name>, <string-name><surname>Alsharif</surname> <given-names>MH</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>BM</given-names></string-name></person-group>. <article-title>Emerging technologies for 6G communication networks: machine learning approaches</article-title>. <source>Sensors</source>. <year>2023</year>;<volume>23</volume>(<issue>18</issue>):<fpage>7709</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s23187709</pub-id>; <pub-id pub-id-type="pmid">37765765</pub-id></mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdel Hakeem</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Hussein</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Security requirements and challenges of 6G technologies and applications</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>5</issue>):<fpage>1969</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22051969</pub-id>; <pub-id pub-id-type="pmid">35271113</pub-id></mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Aruna</surname> <given-names>S</given-names></string-name>, <string-name><surname>Priya</surname> <given-names>SM</given-names></string-name>, <string-name><surname>Reshmeetha</surname> <given-names>K</given-names></string-name>, <string-name><surname>Sudhayini</surname> <given-names>ES</given-names></string-name>, <string-name><surname>Narayanan</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>Blockchain integration with artificial intelligence and Internet of Things technologies</article-title>. In: <conf-name>Proceedings of the 7th International Conference on Intelligent Computing and Control Systems (ICICCS)</conf-name>; <year>2023 May 17&#x2013;19</year>; <publisher-loc>Madurai, India</publisher-loc>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chaudjary</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kakkar</surname> <given-names>R</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>R</given-names></string-name>, <string-name><surname>Tanwar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Agrawal</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review</article-title>. <source>Turk J Electr Eng Comput Sci</source>. <year>2022</year>;<volume>30</volume>(<issue>7</issue>):<fpage>2446</fpage>&#x2013;<lpage>88</lpage>. doi:<pub-id pub-id-type="doi">10.55730/1300-0632.3950</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmed</surname> <given-names>HA</given-names></string-name>, <string-name><surname>Jasim</surname> <given-names>HM</given-names></string-name>, <string-name><surname>Gatea</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Al-Asadi</surname> <given-names>AAA</given-names></string-name>, <string-name><surname>Al-Asadi</surname> <given-names>HAA</given-names></string-name></person-group>. <article-title>A secure and efficient blockchain enabled federated Q-learning model for vehicular Ad-hoc networks</article-title>. <source>Sci Rep</source>. <year>2024</year>;<volume>14</volume>(<issue>1</issue>):<fpage>31235</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-024-82585-3</pub-id>; <pub-id pub-id-type="pmid">39732861</pub-id></mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Karabulut</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>AS</given-names></string-name></person-group>. <article-title>A study and future challenges in 6G networks: aeronautical network, AI and blockchain</article-title>. <source>JAST</source>. <year>2024</year>;<volume>17</volume>(<issue>2</issue>):<fpage>122</fpage>&#x2013;<lpage>38</lpage>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Jiang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>A smart contract vulnerability detection mechanism based on deep learning and expert rules</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>77990</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2023.3298048</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al Hwaitat</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Almaiah</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>A</given-names></string-name>, <string-name><surname>Al-Otaibi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shishakly</surname> <given-names>R</given-names></string-name>, <string-name><surname>Lutfi</surname> <given-names>A</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A new blockchain-based authentication framework for secure IoT networks</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>17</issue>):<fpage>3618</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics12173618</pub-id>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Li</surname> <given-names>G</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>L</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>A secure data sharing system for 6G networks</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>133281</fpage>&#x2013;<lpage>93</lpage>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bathula</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Merugu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Saba</surname> <given-names>L</given-names></string-name>, <string-name><surname>Khanna</surname> <given-names>NN</given-names></string-name>, <string-name><surname>Laird</surname> <given-names>JR</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Blockchain, artificial intelligence, and healthcare: the tripod of future&#x2014;a narrative review</article-title>. <source>Artif Intell Rev</source>. <year>2024</year>;<volume>57</volume>(<issue>9</issue>):<fpage>238</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s10462-024-10873-5</pub-id>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Letaief</surname> <given-names>KB</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Edge artificial intelligence for 6G: vision, enabling technologies, and applications</article-title>. <source>IEEE J Sel Areas Commun</source>. <year>2022</year>;<volume>40</volume>(<issue>1</issue>):<fpage>5</fpage>&#x2013;<lpage>36</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jsac.2021.3126076</pub-id>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ismail</surname> <given-names>L</given-names></string-name>, <string-name><surname>Buyya</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Artificial intelligence applications and self-learning 6G networks for smart cities digital ecosystems: taxonomy, challenges, and future directions</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>15</issue>):<fpage>5750</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22155750</pub-id>; <pub-id pub-id-type="pmid">35957307</pub-id></mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kuznetsov</surname> <given-names>O</given-names></string-name>, <string-name><surname>Sernani</surname> <given-names>P</given-names></string-name>, <string-name><surname>Romeo</surname> <given-names>L</given-names></string-name>, <string-name><surname>Frontoni</surname> <given-names>E</given-names></string-name>, <string-name><surname>Mancini</surname> <given-names>A</given-names></string-name></person-group>. <article-title>On the integration of artificial intelligence and blockchain technology: a perspective about security</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>3881</fpage>&#x2013;<lpage>97</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2023.3349019</pub-id>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Martinez</surname> <given-names>D</given-names></string-name>, <string-name><surname>Magdalena</surname> <given-names>L</given-names></string-name>, <string-name><surname>Savitri</surname> <given-names>AN</given-names></string-name></person-group>. <article-title>AI and blockchain integration: enhancing security and transparency in financial transactions</article-title>. <source>Int Trans Artif Intell</source>. <year>2024</year>;<volume>3</volume>(<issue>1</issue>):<fpage>11</fpage>&#x2013;<lpage>20</lpage>. doi:<pub-id pub-id-type="doi">10.33050/italic.v3i1.651</pub-id>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhumichai</surname> <given-names>D</given-names></string-name>, <string-name><surname>Smiliotopoulos</surname> <given-names>C</given-names></string-name>, <string-name><surname>Benton</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kambourakis</surname> <given-names>G</given-names></string-name>, <string-name><surname>Damopoulos</surname> <given-names>D</given-names></string-name></person-group>. <article-title>The convergence of artificial intelligence and blockchain: the state of play and the road ahead</article-title>. <source>Information</source>. <year>2024</year>;<volume>15</volume>(<issue>5</issue>):<fpage>268</fpage>. doi:<pub-id pub-id-type="doi">10.3390/info15050268</pub-id>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chavali</surname> <given-names>BT</given-names></string-name>, <string-name><surname>Khatri</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Hossain</surname> <given-names>SA</given-names></string-name></person-group>. <article-title>AI and blockchain integration</article-title>. In: <conf-name>Proceedings of the 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)</conf-name>; <year>2020 Jun 4&#x2013;5</year>; <publisher-loc>Noida, India</publisher-loc>.</mixed-citation></ref>
<ref id="ref-57"><label>[57]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdelhamid</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sliman</surname> <given-names>L</given-names></string-name>, <string-name><surname>Ben Djemaa</surname> <given-names>R</given-names></string-name>, <string-name><surname>Perboli</surname> <given-names>G</given-names></string-name></person-group>. <article-title>A review on blockchain technology, current challenges, and AI-driven solutions</article-title>. <source>ACM Comput Surv</source>. <year>2025</year>;<volume>57</volume>(<issue>3</issue>):<fpage>1</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3700641</pub-id>.</mixed-citation></ref>
<ref id="ref-58"><label>[58]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Charles</surname> <given-names>V</given-names></string-name>, <string-name><surname>Emrouznejad</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gherman</surname> <given-names>T</given-names></string-name></person-group>. <article-title>A critical analysis of the integration of blockchain and artificial intelligence for supply chain</article-title>. <source>Ann Oper Res</source>. <year>2023</year>;<volume>327</volume>(<issue>1</issue>):<fpage>7</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s10479-023-05169-w</pub-id>; <pub-id pub-id-type="pmid">36718465</pub-id></mixed-citation></ref>
<ref id="ref-59"><label>[59]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zuo</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Exploring the synergy: AI enhancing blockchain, blockchain empowering AI, and their convergence across IoT applications and beyond</article-title>. <source>IEEE Internet Things J</source>. <year>2025</year>;<volume>12</volume>(<issue>6</issue>):<fpage>6171</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2024.3507746</pub-id>.</mixed-citation></ref>
<ref id="ref-60"><label>[60]</label><mixed-citation publication-type="other"><article-title>6G technologies&#x2014;security, trust and privacy&#x2014;Nokia Bell Labs [Internet]</article-title>. [cited 2025 Jan 25]. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.bell-labs.com/research-innovation/what-is-6g/6g-technologies/security-and-trust">https://www.bell-labs.com/research-innovation/what-is-6g/6g-technologies/security-and-trust</ext-link>.</mixed-citation></ref>
<ref id="ref-61"><label>[61]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Siriwardhana</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Porambage</surname> <given-names>P</given-names></string-name>, <string-name><surname>Liyanage</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ylianttila</surname> <given-names>M</given-names></string-name></person-group>. <article-title>AI and 6G security: opportunities and challenges</article-title>. In: <conf-name>Proceedings of the IEEE Joint European Conference on Networks and Communications &#x0026; 6G Summit (EuCNC/6G Summit)</conf-name>; <year>2021 Jun 8&#x2013;11</year>; <publisher-loc>Porto, Portugal</publisher-loc>.</mixed-citation></ref>
<ref id="ref-62"><label>[62]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ara</surname> <given-names>I</given-names></string-name>, <string-name><surname>Kelley</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Physical layer security for 6G: toward achieving intelligent native security at layer-1</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>82800</fpage>&#x2013;<lpage>24</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3413047</pub-id>.</mixed-citation></ref>
<ref id="ref-63"><label>[63]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Porambage</surname> <given-names>P</given-names></string-name>, <string-name><surname>G&#x000FC;r</surname> <given-names>G</given-names></string-name>, <string-name><surname>Moya Osorio</surname> <given-names>DP</given-names></string-name>, <string-name><surname>Livanage</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ylianttila</surname> <given-names>M</given-names></string-name></person-group>. <article-title>6G security challenges and potential solutions</article-title>. In: <conf-name>2021 Joint European Conference on Networks and Communications &#x00026; 6G Summit (EuCNC/6G Summit)</conf-name>; <year>2021</year>; <publisher-loc>Porto, Portugal</publisher-loc>. p. <fpage>622</fpage>&#x2013;<lpage>7</lpage>. doi:<ext-link ext-link-type="uri" xlink:href="https://www.6gworld.com/10.1109/EuCNC/6GSummit51104.2021.9482609">10.1109/EuCNC/6GSummit51104.2021.9482609</ext-link>.</mixed-citation></ref>
<ref id="ref-64"><label>[64]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Blika</surname> <given-names>A</given-names></string-name>, <string-name><surname>Palmos</surname> <given-names>S</given-names></string-name>, <string-name><surname>Doukas</surname> <given-names>G</given-names></string-name>, <string-name><surname>Lamprou</surname> <given-names>V</given-names></string-name>, <string-name><surname>Pelekis</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kontoulis</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Federated learning for enhanced cybersecurity and trustworthiness in 5G and 6G networks: a comprehensive survey</article-title>. <source>IEEE Open J Commun Soc</source>. <year>2024</year>;<volume>6</volume>:<fpage>3094</fpage>&#x2013;<lpage>130</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ojcoms.2024.3449563</pub-id>.</mixed-citation></ref>
<ref id="ref-65"><label>[65]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nahar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Andersson</surname> <given-names>K</given-names></string-name>, <string-name><surname>Schel&#x00E9;n</surname> <given-names>O</given-names></string-name>, <string-name><surname>Saguna</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A survey on zero trust architecture: applications and challenges of 6G networks</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>94753</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3425350</pub-id>.</mixed-citation></ref>
<ref id="ref-66"><label>[66]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>W</given-names></string-name>, <string-name><surname>Su</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>K</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Blockchain-based data security for artificial intelligence applications in 6G networks</article-title>. <source>IEEE Netw</source>. <year>2020</year>;<volume>34</volume>(<issue>6</issue>):<fpage>31</fpage>&#x2013;<lpage>7</lpage>. doi:<pub-id pub-id-type="doi">10.1109/mnet.021.1900629</pub-id>.</mixed-citation></ref>
<ref id="ref-67"><label>[67]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Porambage</surname> <given-names>P</given-names></string-name>, <string-name><surname>G&#x00FC;r</surname> <given-names>G</given-names></string-name>, <string-name><surname>Osorio</surname> <given-names>DPM</given-names></string-name>, <string-name><surname>Liyanage</surname> <given-names>M</given-names></string-name>, <string-name><surname>Gurtov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ylianttila</surname> <given-names>M</given-names></string-name></person-group>. <article-title>The roadmap to 6G security and privacy</article-title>. <source>IEEE Open J Commun Soc</source>. <year>2021</year>;<volume>2</volume>:<fpage>1094</fpage>&#x2013;<lpage>122</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ojcoms.2021.3078081</pub-id>.</mixed-citation></ref>
<ref id="ref-68"><label>[68]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Lyu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Peter</surname> <given-names>JD</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>BG</given-names></string-name></person-group>. <article-title>Privacy-preserving AI framework for 6G-enabled consumer electronics</article-title>. <source>IEEE Trans Consum Electron</source>. <year>2024</year>;<volume>70</volume>(<issue>1</issue>):<fpage>3940</fpage>&#x2013;<lpage>50</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tce.2024.3371928</pub-id>.</mixed-citation></ref>
<ref id="ref-69"><label>[69]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Moya Osorio</surname> <given-names>DP</given-names></string-name>, <string-name><surname>Ahmad</surname> <given-names>I</given-names></string-name>, <string-name><surname>Sanchez</surname> <given-names>JDV</given-names></string-name>, <string-name><surname>Gurtov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Scholliers</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kutila</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Towards 6G-enabled Internet of vehicles: security and privacy</article-title>. <source>IEEE Open J Commun Soc</source>. <year>2022</year>;<volume>3</volume>:<fpage>82</fpage>&#x2013;<lpage>105</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ojcoms.2022.3143098</pub-id>.</mixed-citation></ref>
<ref id="ref-70"><label>[70]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Scalise</surname> <given-names>P</given-names></string-name>, <string-name><surname>Boeding</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hempel</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sharif</surname> <given-names>H</given-names></string-name>, <string-name><surname>Delloiacovo</surname> <given-names>J</given-names></string-name>, <string-name><surname>Reed</surname> <given-names>J</given-names></string-name></person-group>. <article-title>A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas</article-title>. <source>Future Internet</source>. <year>2024</year>;<volume>16</volume>(<issue>3</issue>):<fpage>67</fpage>. doi:<pub-id pub-id-type="doi">10.3390/fi16030067</pub-id>.</mixed-citation></ref>
<ref id="ref-71"><label>[71]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saad</surname> <given-names>W</given-names></string-name>, <string-name><surname>Bennis</surname> <given-names>M</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A vision of 6G wireless systems: applications trends technologies and open research problems</article-title>. <source>IEEE Netw</source>. <year>2020</year>;<volume>34</volume>(<issue>3</issue>):<fpage>134</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.1109/mnet.001.1900287</pub-id>.</mixed-citation></ref>
<ref id="ref-72"><label>[72]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ziegler</surname> <given-names>V</given-names></string-name>, <string-name><surname>Schneider</surname> <given-names>P</given-names></string-name>, <string-name><surname>Viswanathan</surname> <given-names>H</given-names></string-name>, <string-name><surname>Montag</surname> <given-names>M</given-names></string-name>, <string-name><surname>Kanugovi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rezaki</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Security and trust in the 6G era</article-title>. <source>IEEE Access</source>. <year>2021</year>;<volume>9</volume>:<fpage>142314</fpage>&#x2013;<lpage>27</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2021.3120143</pub-id>.</mixed-citation></ref>
<ref id="ref-73"><label>[73]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Shirwaikar</surname> <given-names>RD</given-names></string-name>, <string-name><surname>Faisal</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shanbhag</surname> <given-names>DD</given-names></string-name></person-group>. <article-title>A review on privacy and security in 6G networks</article-title>. In: <conf-name>Proceedings of the International Conference on Forensics, Analytics, Big Data, Security (FABS)</conf-name>; <year>2021 Dec 21&#x2013;22</year>; <publisher-loc>Bengaluru, India</publisher-loc>.</mixed-citation></ref>
<ref id="ref-74"><label>[74]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Siddiqui</surname> <given-names>ST</given-names></string-name>, <string-name><surname>Kamal</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Qidwai</surname> <given-names>KA</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>MI</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>H</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>MZ</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Uncovering network vulnerabilities and conducting digital forensics analysis for IoT device security in 6G</article-title>. In: <conf-name>Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)</conf-name>; <year>2023 Dec 17&#x2013;20</year>; <publisher-loc>Jaipur, India</publisher-loc>. doi:<pub-id pub-id-type="doi">10.1109/ANTS59832.2023.10469094</pub-id>.</mixed-citation></ref>
<ref id="ref-75"><label>[75]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alqabbani</surname> <given-names>A</given-names></string-name>, <string-name><surname>Saleem</surname> <given-names>K</given-names></string-name>, <string-name><surname>Almazyad</surname> <given-names>AS</given-names></string-name></person-group>. <article-title>Digital communication forensics in 6G and beyond networks</article-title>. <source>Appl Sci</source>. <year>2023</year>;<volume>13</volume>(<issue>19</issue>):<fpage>10861</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app131910861</pub-id>.</mixed-citation></ref>
<ref id="ref-76"><label>[76]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Akinbi</surname> <given-names>AO</given-names></string-name></person-group>. <article-title>Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks</article-title>. <source>WIREs Forensic Sci</source>. <year>2023</year>;<volume>5</volume>(<issue>6</issue>):<fpage>e1496</fpage>. doi:<pub-id pub-id-type="doi">10.1002/wfs2.1496</pub-id>.</mixed-citation></ref>
<ref id="ref-77"><label>[77]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Nguyen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Ijaz</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sheikhi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Vasilakos</surname> <given-names>AV</given-names></string-name>, <string-name><surname>Kostakos</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Large language models in 6G security: challenges and opportunities</article-title>. <comment>arXiv:2403.12239v1. 2024</comment>.</mixed-citation></ref>
<ref id="ref-78"><label>[78]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jiao</surname> <given-names>L</given-names></string-name>, <string-name><surname>Shao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>L</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>W</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Advanced deep learning models for 6G: overview, opportunities, and challenges</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>133245</fpage>&#x2013;<lpage>314</lpage>.</mixed-citation></ref>
<ref id="ref-79"><label>[79]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Anwar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Widodo</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Sekti</surname> <given-names>BA</given-names></string-name>, <string-name><surname>Ulum</surname> <given-names>MB</given-names></string-name>, <string-name><surname>Rahaman</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ariessanti</surname> <given-names>HD</given-names></string-name></person-group>. <article-title>Comparative analysis of NIJ and NIST methods for microsd investigations: a technopreneur approach</article-title>. <source>APTISI Trans Technopreneurship</source>. <year>2024</year>;<volume>6</volume>(<issue>2</issue>):<fpage>169</fpage>&#x2013;<lpage>81</lpage>. doi:<pub-id pub-id-type="doi">10.34306/att.v6i2.407</pub-id>.</mixed-citation></ref>
<ref id="ref-80"><label>[80]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shen</surname> <given-names>LH</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>KT</given-names></string-name>, <string-name><surname>Hanzo</surname> <given-names>L</given-names></string-name></person-group>. <article-title>Five facets of 6G: research challenges and opportunities</article-title>. <source>ACM Comput Surv</source>. <year>2023</year>;<volume>55</volume>(<issue>11</issue>):<fpage>2023</fpage>.</mixed-citation></ref>
<ref id="ref-81"><label>[81]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alam</surname> <given-names>I</given-names></string-name>, <string-name><surname>Sharif</surname> <given-names>K</given-names></string-name>, <string-name><surname>Li</surname> <given-names>F</given-names></string-name>, <string-name><surname>Latif</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Karim</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Biswas</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>A survey of network virtualization techniques for Internet of Things using SDN and NFV</article-title>. <source>ACM Comput Surv</source>. <year>2021</year>;<volume>53</volume>(<issue>2</issue>):<fpage>2021</fpage>. doi:<pub-id pub-id-type="doi">10.1145/3379444</pub-id>.</mixed-citation></ref>
<ref id="ref-82"><label>[82]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Zimmer</surname> <given-names>V</given-names></string-name>, <string-name><surname>Rothman</surname> <given-names>M</given-names></string-name>, <string-name><surname>Marisetty</surname> <given-names>S</given-names></string-name></person-group>. <source>Beyond BIOS: developing with the unified extensible firmware interface</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Walter de Gruyter GmbH &#x0026; Co. KG</publisher-name>; <year>2017</year>. <fpage>322</fpage> p.</mixed-citation></ref>
<ref id="ref-83"><label>[83]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tanque</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bradford</surname> <given-names>PG</given-names></string-name></person-group>. <article-title>Virtual Raspberry Pi-s with blockchain and cybersecurity applications</article-title>. <source>Adv Comput</source>. <year>2023</year>;<volume>131</volume>:<fpage>201</fpage>&#x2013;<lpage>32</lpage>. doi:<pub-id pub-id-type="doi">10.1016/bs.adcom.2023.04.005</pub-id>.</mixed-citation></ref>
<ref id="ref-84"><label>[84]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bradford</surname> <given-names>PG</given-names></string-name></person-group>. <source>Chains that bind us</source>; <year>2023 Dec 28</year>. <fpage>240</fpage> p. <comment>[cited 2025 Mar 15]</comment>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.amazon.com/Chains-that-bind-Phillip-Bradford/dp/1917007884">https://www.amazon.com/Chains-that-bind-Phillip-Bradford/dp/1917007884</ext-link>.</mixed-citation></ref>
<ref id="ref-85"><label>[85]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Le</surname> <given-names>T</given-names></string-name></person-group>. <article-title>A survey of live virtual machine migration techniques</article-title>. <source>Comput Sci Rev</source>. <year>2018</year>;<volume>38</volume>:<fpage>100304</fpage>.</mixed-citation></ref>
<ref id="ref-86"><label>[86]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Miloji&#x010D;i&#x0107;</surname> <given-names>DS</given-names></string-name>, <string-name><surname>Douglis</surname> <given-names>F</given-names></string-name>, <string-name><surname>Paindaveine</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wheeler</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Process migration</article-title>. <source>ACM Comput Surv</source>. <year>2000</year>;<volume>23</volume>(<issue>3</issue>):<fpage>241</fpage>&#x2013;<lpage>99</lpage>. doi:<pub-id pub-id-type="doi">10.1145/367701.367728</pub-id>.</mixed-citation></ref>
<ref id="ref-87"><label>[87]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Andrew</surname> <given-names>J</given-names></string-name>, <string-name><surname>Isravel</surname> <given-names>DP</given-names></string-name>, <string-name><surname>Sagayam</surname> <given-names>KM</given-names></string-name>, <string-name><surname>Bhushan</surname> <given-names>B</given-names></string-name>, <string-name><surname>Sei</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Eunice</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Blockchain for healthcare systems: architecture, security challenges, trends and future directions</article-title>. <source>J Netw Comput Appl</source>. <year>2023</year>;<volume>215</volume>:<fpage>103633</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jnca.2023.103633</pub-id>.</mixed-citation></ref>
<ref id="ref-88"><label>[88]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Javaid</surname> <given-names>M</given-names></string-name>, <string-name><surname>Haleem</surname> <given-names>A</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>RP</given-names></string-name>, <string-name><surname>Suman</surname> <given-names>R</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A review of blockchain technology applications for financial services</article-title>. <source>BenchCouncil Trans Benchmarks Stand Eval</source>. <year>2022</year>;<volume>2</volume>(<issue>3</issue>):<fpage>100073</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.tbench.2022.100073</pub-id>.</mixed-citation></ref>
<ref id="ref-89"><label>[89]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Feretzakis</surname> <given-names>G</given-names></string-name>, <string-name><surname>Papaspyridis</surname> <given-names>K</given-names></string-name>, <string-name><surname>Gkoulalas-Divanis</surname> <given-names>A</given-names></string-name>, <string-name><surname>Verykios</surname> <given-names>VS</given-names></string-name></person-group>. <article-title>Privacy-preserving techniques in generative AI and large language models: a narrative review</article-title>. <source>Information</source>. <year>2024</year>;<volume>15</volume>(<issue>11</issue>):<fpage>697</fpage>. doi:<pub-id pub-id-type="doi">10.3390/info15110697</pub-id>.</mixed-citation></ref>
<ref id="ref-90"><label>[90]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pati</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Varma</surname> <given-names>A</given-names></string-name>, <string-name><surname>Edwards</surname> <given-names>B</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>C</given-names></string-name>, <string-name><surname>Qu</surname> <given-names>L</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Privacy preservation for federated learning in health care</article-title>. <source>Patterns</source>. <year>2024</year>;<volume>5</volume>(<issue>7</issue>):<fpage>100974</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.patter.2024.100974</pub-id>; <pub-id pub-id-type="pmid">39081567</pub-id></mixed-citation></ref>
<ref id="ref-91"><label>[91]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Catak</surname> <given-names>FO</given-names></string-name>, <string-name><surname>Kuzlu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Catak</surname> <given-names>E</given-names></string-name>, <string-name><surname>Cali</surname> <given-names>U</given-names></string-name>, <string-name><surname>Unal</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Security concerns on machine learning solutions for 6G networks in mmWave beam prediction</article-title>. <source>Phys Commun</source>. <year>2022</year>;<volume>52</volume>:<fpage>101626</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.phycom.2022.101626</pub-id>.</mixed-citation></ref>
<ref id="ref-92"><label>[92]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Giannaros</surname> <given-names>A</given-names></string-name>, <string-name><surname>Karras</surname> <given-names>A</given-names></string-name>, <string-name><surname>Theodorakopoulos</surname> <given-names>L</given-names></string-name>, <string-name><surname>Karras</surname> <given-names>C</given-names></string-name>, <string-name><surname>Kranias</surname> <given-names>P</given-names></string-name>, <string-name><surname>Schizas</surname> <given-names>N</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Autonomous vehicles: sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions</article-title>. <source>J Cybersecur Priv</source>. <year>2023</year>;<volume>3</volume>(<issue>3</issue>):<fpage>493</fpage>&#x2013;<lpage>543</lpage>. doi:<pub-id pub-id-type="doi">10.3390/jcp3030025</pub-id>.</mixed-citation></ref>
<ref id="ref-93"><label>[93]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alhussien</surname> <given-names>N</given-names></string-name>, <string-name><surname>Aaron Gulliver</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Toward AI-enabled green 6G networks: a resource management perspective</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>132972</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3460656</pub-id>.</mixed-citation></ref>
<ref id="ref-94"><label>[94]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>P</given-names></string-name>, <string-name><surname>Adnan</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Overview of emerging electronics technologies for artificial intelligence: a review</article-title>. <source>Mater Today Electron</source>. <year>2025</year>;<volume>11</volume>:<fpage>100136</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.mtelec.2025.100136</pub-id>.</mixed-citation></ref>
<ref id="ref-95"><label>[95]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chafiq</surname> <given-names>T</given-names></string-name>, <string-name><surname>Azmi</surname> <given-names>R</given-names></string-name>, <string-name><surname>Fadil</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mohammed</surname> <given-names>O</given-names></string-name></person-group>. <article-title>Investigating the potential of blockchain technology for geospatial data sharing: opportunities, challenges, and solutions</article-title>. <source>Geomatica</source>. <year>2024</year>;<volume>76</volume>(<issue>2</issue>):<fpage>100026</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.geomat.2024.100026</pub-id>.</mixed-citation></ref>
<ref id="ref-96"><label>[96]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farah</surname> <given-names>MB</given-names></string-name>, <string-name><surname>Ahmed</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Mahmoud</surname> <given-names>H</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Al-Kadri</surname> <given-names>MO</given-names></string-name>, <string-name><surname>Taramonli</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A survey on blockchain technology in the maritime industry: challenges and future perspectives</article-title>. <source>Future Gener Comput Syst</source>. <year>2024</year>;<volume>157</volume>:<fpage>618</fpage>&#x2013;<lpage>37</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2024.03.046</pub-id>.</mixed-citation></ref>
<ref id="ref-97"><label>[97]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Huang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Mao</surname> <given-names>B</given-names></string-name>, <string-name><surname>Yao</surname> <given-names>X</given-names></string-name></person-group>. <article-title>An overview of artificial intelligence ethics</article-title>. <source>IEEE Trans Artif Intell</source>. <year>2023</year>;<volume>4</volume>(<issue>4</issue>):<fpage>799</fpage>&#x2013;<lpage>819</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tai.2022.3194503</pub-id>.</mixed-citation></ref>
<ref id="ref-98"><label>[98]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdallah</surname> <given-names>M</given-names></string-name>, <string-name><surname>Salah</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Artificial intelligence and intellectual properties: legal and ethical considerations</article-title>. <source>Int J Intell Syst Appl Eng</source>. <year>2023</year>;<volume>12</volume>(<issue>1</issue>):<fpage>368</fpage>&#x2013;<lpage>76</lpage>.</mixed-citation></ref>
<ref id="ref-99"><label>[99]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Venkatesan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Rahayu</surname> <given-names>SB</given-names></string-name></person-group>. <article-title>Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques</article-title>. <source>Sci Rep</source>. <year>2024</year>;<volume>14</volume>(<issue>1</issue>):<fpage>1149</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-024-51578-7</pub-id>; <pub-id pub-id-type="pmid">38212390</pub-id></mixed-citation></ref>
<ref id="ref-100"><label>[100]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mishra</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>16</issue>):<fpage>3524</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics12163524</pub-id>.</mixed-citation></ref>
<ref id="ref-101"><label>[101]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Manjula</surname> <given-names>SG</given-names></string-name>, <string-name><surname>Mulay</surname> <given-names>C</given-names></string-name>, <string-name><surname>Durai</surname> <given-names>K</given-names></string-name>, <string-name><surname>Murali</surname> <given-names>G</given-names></string-name>, <string-name><surname>Ibrahim Syed Masood</surname> <given-names>JA</given-names></string-name>, <string-name><surname>Vijayarajan</surname> <given-names>V</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Quantum blockchain: trends, technologies, and future directions</article-title>. <source>IET Quantum Commun</source>. <year>2024</year>;<volume>5</volume>(<issue>4</issue>):<fpage>516</fpage>&#x2013;<lpage>42</lpage>. doi:<pub-id pub-id-type="doi">10.1049/qtc2.12119</pub-id>.</mixed-citation></ref>
<ref id="ref-102"><label>[102]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Parida</surname> <given-names>NK</given-names></string-name>, <string-name><surname>Jatoth</surname> <given-names>C</given-names></string-name>, <string-name><surname>Reddy</surname> <given-names>VD</given-names></string-name>, <string-name><surname>Hussain</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Faizi</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Post-quantum distributed ledger technology: a systematic survey</article-title>. <source>Sci Rep</source>. <year>2023</year>;<volume>13</volume>(<issue>1</issue>):<fpage>20729</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-023-47331-1</pub-id>; <pub-id pub-id-type="pmid">38007570</pub-id></mixed-citation></ref>
<ref id="ref-103"><label>[103]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hua</surname> <given-names>W</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Qadrdan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Jiang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>H</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Applications of blockchain and artificial intelligence technologies for enabling prosumers in smart grids: a review</article-title>. <source>Renew Sustain Energy Rev</source>. <year>2022</year>;<volume>161</volume>:<fpage>112308</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.rser.2022.112308</pub-id>.</mixed-citation></ref>
<ref id="ref-104"><label>[104]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Song</surname> <given-names>X</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Yin</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lan</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Recent advances in blockchain and artificial intelligence integration: feasibility analysis, research issues, applications, challenges, and future work</article-title>. <source>Secur Commun Netw</source>. <year>2021</year>;<volume>2021</volume>:<fpage>1</fpage>&#x2013;<lpage>15</lpage>.</mixed-citation></ref>
<ref id="ref-105"><label>[105]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahammed</surname> <given-names>TB</given-names></string-name>, <string-name><surname>Patgiri</surname> <given-names>R</given-names></string-name>, <string-name><surname>Nayak</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A vision on the artificial intelligence for 6G communication</article-title>. <source>ICT Express</source>. <year>2023</year>;<volume>9</volume>(<issue>2</issue>):<fpage>197</fpage>&#x2013;<lpage>210</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.icte.2022.05.005</pub-id>.</mixed-citation></ref>
<ref id="ref-106"><label>[106]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kharche</surname> <given-names>A</given-names></string-name>, <string-name><surname>Badholia</surname> <given-names>S</given-names></string-name>, <string-name><surname>Upadhyay</surname> <given-names>RK</given-names></string-name></person-group>. <article-title>Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India</article-title>. <source>Blockchain Res Appl</source>. <year>2024</year>;<volume>5</volume>(<issue>2</issue>):<fpage>100188</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.bcra.2024.100188</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>