Search

Browse Subject Areas

For Authors

Submit a Proposal

Secure Blockchain and Quantum Technologies for 6G-Enabled IoT

Edited by T. Perarsi, M. Karthiga, S. Sountharrajan, E. Suganya, and Balamurugan Balusamy
Copyright: 2026   |   Expected Pub Date: 2026
ISBN: 9781394310678  |  Hardcover  |  
378 pages
Price: $225 USD
Add To Cart

One Line Description
Future-proof your hyper-connected infrastructure against the looming quantum threat bwith this guide to mastering blockchain-driven security frameworks and quantum-resistant architectures essential for safeguarding data integrity in the 6G-powered era.

Audience
Researchers, academics, and professionals in the fields of wireless communication, Internet of Things, cryptography, and quantum computing.

Description
6G networks promise unprecedented speed, capacity, and reliability, enabling a massive expansion of connected devices within the Internet of Things. However, securing this ever-growing network presents significant challenges. While offering unparalleled processing power, quantum computers pose a threat to current encryption methods used in securing data communication. This book explores the need for quantum-resistant solutions for the 6G-powered Internet of Things. Through expert insights and real-world scenarios, it explores how blockchain can be leveraged to ensure data integrity, provenance, and secure device authentication within the 6G IoT. This volume offers comprehensive coverage of this emerging technology and its potential to leverage 6G technology, making it an invaluable resource for the field.

Back to Top
Author / Editor Details
T. Perarasi, PhD is a Professor in the Department of Electronics and Communication Engineering at the Bannari Amman Institute of Technology with more than 20 years of experience. She has authored a book, eight book chapters, and 32 articles in national and international journals, presented more than 50 papers in international conferences, and filed 14 patents. Her current research includes Internet of Things, cognitive radio networks, antenna systems, and wireless networks.

M. Karthiga, PhD is an Associate Professor in the Department of Computer Science and Engineering at the Bannari Amman Institute of Technology with more than 11 years of experience. She has published 28 articles in national and international journals and more than 11 book chapters. Her research interests include data mining, image mining, Internet of Things, artificial intelligence, and deep learning.

S. Sountharrajan, PhD is an Associate Professor in the School of Computing at the Amrita Vishwa Vidyapeetham’s Chennai Campus. He has published papers more than 15 papers in national and international conferences and 35 international journals. His research focuses on big data, cloud computing, and cloud-deployed applications.

E. Suganya, PhD is an Assistant Professor in the Department of Information Technology at the Sri Sivasubramaniya Nadar College of Engineering. She has published more than 20 papers in national and international journals and conferences. Her current research interests include data analytics, data mining, and optimization algorithms.

Balamurugan Balusamy, PhD is an Associate Dean of Students at Shiv Nadar University with more than 12 years of experience. He has published more than 200 papers in international journals and more than 80 books. His research interests include XAI, data science, and blockchain technologies.

Back to Top

Table of Contents
List of Contributors
Preface
Acknowledgements
1. Harnessing 6G for Diverse IoT Applications

A. Saran Kumar, K. Dhana Shree, M. Nivaashini, V. Praveen, S. Priyanka and Muhammad Nawaz Khan
1.1 Introduction
1.1.1 6G Systems – Transforming the Technologies
1.1.2 6G Network for Communication
1.2 The Evolution of 6G Network System
1.2.1 Wireless Access
1.2.2 Network Applications
1.2.3 Management
1.3 The 6G System
1.3.1 Network Division
1.3.2 Industry Automation
1.3.3 6G Networks in Industrial IoT (IIoT)
1.3.4 Automotive and Mobility Models
1.3.5 Automated Connected Vehicles
1.3.6 Augmented and Virtual Reality
1.3.7 Media and Content
1.3.8 Gaming Industry
1.3.9 Smart City
1.3.10 Health Care Management
1.3.11 Construction Industry
1.3.12 Pharmaceutical Industry
1.3.13 A Significant Quantity of Widely Distributed Devices
1.3.14 Transport
1.3.15 Cloud and Fog Networks
1.4 Conclusion
References
2. Demystifying 6G: Unlocking the Potential of the Next Generation Wireless Networks
G. Amuthavalli, U. Palani and M. Bavethra
2.1 Introduction to the Evolution of Wireless Networks
2.2 Need and Motivation
2.2.1 Need for 6G
2.2.2 Motivation Towards 6G
2.3 Unlocking the 6G Capabilities
2.3.1 Enhanced Capabilities of 6G
2.3.2 New Capabilities of 6G
2.4 Usage Scenarios of 6G
2.4.1 Usage Scenarios of 6G-Extension of 5G
2.4.1.1 Immersive Communication
2.4.1.2 Hyper Reliable and Low Latency Communication
2.4.1.3 Massive Communication
2.4.2 New Usage Scenarios
2.4.2.1 Integrated Sensing and Communication
2.4.2.2 Artificial Intelligence and Communication
2.4.2.3 Ubiquitous Connectivity
2.5 Technology Trends and Enablers of 6G
2.5.1 Tera Hertz Communication
2.5.2 Joined Sensing and Communication
2.5.3 Integrated Intelligence and Communication
2.5.4 Ultra-Massive MIMO
2.5.5 Reconfigurable Intelligence Surface
2.5.6 Co-Frequency and Co-Time Full Duplex Communication
2.5.7 Holographic Radio Technology
2.5.8 Ultra-Low Power IoT Communication
2.6 Spectrum of 6G
2.7 Conclusion and Scope of Research
References
3. Dynamic Client Selection in Energy-Aware Federated Learning for IoT-Enabled Edge Networks
Gummarekula Sattibabu and G. Nagarajan
3.1 Introduction
3.1.1 IoT and Edge Computing
3.1.2 Federated Learning
3.1.3 Challenges
3.1.4 Advancements in Energy-Efficient FL
3.1.5 Energy Consumption in IoT Devices
3.1.6 Energy-Aware Dynamic Client Selection Architecture
3.1.7 Benefits of Energy-Aware Algorithms
3.1.8 Chapter Objectives and Structure
3.2 Motivation and Related Works
3.2.1 Client Selection in FL for IoT
3.2.1.1 Client Selection in Federated Learning (FL)
3.2.1.2 Importance in IoT-Enabled Networks
3.2.1.3 Factors and Key Considerations of Client Selection in IoT-FL
3.2.2 Criteria for Client Selection
3.2.2.1 Device Capability
3.2.2.2 Data Quality and Quantity
3.2.2.3 Communication Efficiency
3.2.3 Related Works for Client Selection in Federated Learning
3.2.3.1 Heterogeneity in Systems and Data
3.2.3.2 Communication Overhead and Latency
3.2.3.3 Energy Constraints
3.2.3.4 Volatile Client Population
3.2.3.5 Accuracy and Performance Trade-Offs
3.3 System Model
3.3.1 Clients Data
3.3.1.1 Client Dataset Information
3.3.1.2 Client Bandwidth Information
3.3.1.3 Client Transmission Power Information
3.3.2 System Model Components
3.3.2.1 Energy Consumption Model
3.3.2.2 Training Time of FL
3.3.2.3 FL Accuracy
3.4 Proposed Work
3.4.1 Objective Function Calculation
3.4.2 Workflow for the Proposed System
3.4.3 Simulation Tool and Configuration
3.4.4 Addressing the Limitations of Existing Works
3.4.5 Comparison with Client Selection Schemes
3.5 Simulation Results
3.5.1 Effect of Tmax on Qualified Client Numbers and Selection Dynamics
3.5.2 Impact of Tmax and Accuracy Threshold (ε) on Optimization Performance
3.6 Conclusion and Future Work
References
4. The Connected World: Exploring the Expanding IoT Ecosystem
A. Revathi, R. Kaladevi, M. Vimaladevi, V. Umarani and S. Mohanaselvi
4.1 Introduction
4.2 IoT in Weather Forecasting
4.2.1 Challenges in Weather Forecasting
4.3 IoT in Disaster Management
4.3.1 Role of IoT in Tsunami Warning System
4.4 IoMT-Internet of Medical Things
4.4.1 Challenges
4.5 IoT in Industrial Automation
4.5.1 Key Technologies
4.5.2 Benefits of IIoT
4.5.3 Challenges
4.6 IoT in Agriculture
4.6.1 Types of Agriculture Sensors
4.6.2 How IoT Connects World of Agriculture?
4.6.3 IoT Applications in Agriculture
4.6.4 Challenges of IoT in Agriculture
4.7 Recent Research Trends in IoT
4.8 Conclusion
References
5. Secure Protocols and Blockchain-Based Iot for Smart Home Applications
Senthil Kumaran R., Prabakaran D., Shyamala R. and S. Hannah Pauline
5.1 Introduction
5.2 Literature Review
5.3 Secured Protocols for IoT Environment
5.3.1 Secure Network for Smart Home Network
5.3.2 IoT Network- Protocols
5.3.3 Routing Layer Protocols
5.4 Blockchain Technology in Smart Home Applications
5.4.1 IOTA
5.4.2 Ripple
5.4.3 Blockchain Functions and Algorithm
5.5 Security Analysis
5.6 Conclusion and Future Work
References
6. Future Directions: The Evolving Landscape of Secure 6G IoT with Quantum and Blockchain
Muhammadu Sathik Raja, Swarnalatha A. P., Sowparnika B. and Karthikeyan M.
6.1 Introduction
6.1.1 The Convergence of 6G, IoT, Quantum, and Blockchain
6.1.2 The Need for Advanced Security in 6G IoT
6.1.3 Future 6G IoT Ecosystems Vision
6.2 Quantum Technology and Its Role in 6G IoT
6.2.1 Quantum Computing and Communication Understanding
6.2.2 Quantum Threats to Traditional Security
6.2.3 Quantum-Safe Cryptography
6.2.4 Quantum Key Distribution (QKD)
6.3 Blockchain as a Security Enabler for 6G IoT
6.3.1 Blockchain Fundamentals
6.3.2 Blockchain’s Role in IoT Security
6.3.3 Scalable Blockchain Solutions for 6G IoT
6.3.4 Smart Contracts for IoT Applications
6.4 Synergy of Quantum and Blockchain in 6G IoT
6.4.1 Quantum Computing and Blockchain: Complementary Forces
6.4.2 Quantum-Blockchain Synergy for Enhanced Security
6.4.3 Optimized Performance and Scalability
6.4.4 A New Era of Trust and Transparency
6.5 Advanced Use Cases and Applications
6.5.1 Secure and Autonomous Healthcare Systems
6.5.2 Blockchain-Based Quantum-Secure Supply Chain Management
6.5.3 Smart Cities with Quantum-Blockchain Integration
6.5.4 Decentralized Financial Systems and Quantum-Secure Cryptocurrencies
6.5.5 Quantum-Enhanced Privacy in Identity Management
6.5.6 Enhanced Cybersecurity for IoT Networks
6.5.7 Quantum-Blockchain-Enabled Autonomous Vehicles
6.6 Challenges in Adoption
6.6.1 Complexity of Quantum Computing Integration
6.6.2 Quantum-Safe Cryptography Development
6.6.3 Scalability Issues with Blockchain
6.6.4 Interoperability Between Quantum and Blockchain Systems
6.6.5 Cost and Resource Intensive Implementation
6.6.6 Regulatory and Standardization Issues
6.6.7 Environmental and Energy Considerations
6.6.8 Security Risks in Transition Period
6.6.9 Public Perception and Trust
6.7 Future Research Directions in Quantum and Blockchain Technologies for 6G IoT
6.7.1 Quantum-Safe Cryptography Development and Standardization
6.7.2 Quantum Blockchain Integration for IoT Applications
6.7.3 Scalability and Energy Efficiency in Quantum and Blockchain Systems
6.7.4 Quantum-Blockchain Interoperability and Protocol Design
6.7.5 Quantum-Enhanced Machine Learning for IoT Data Processing
6.7.6 Privacy-Enhancing Technologies in Quantum and Blockchain Systems
6.7.7 Quantum Blockchain for Secure Autonomous Systems
6.7.8 Ethical, Regulatory, and Governance Frameworks for Quantum-Blockchain IoT
6.8 Roadmap for Implementation of Quantum and Blockchain Technologies in 6G IoT
6.9 Conclusion
References
7. Challenges and Considerations: Ethical Implications and Regulatory Framework
Punniyakotti Varadharajan Gopirajan, Kaladevi Ramar, S. Naveen, Vel Murugesh Kumar. N. and Jayaraj Ramasamy
7.1 Overview of Secure Blockchain, Quantum Technologies, and 6G-Enabled IoT
7.2 Ethical Implications
7.2.1 Privacy Concerns
7.2.2 Data Security
7.2.3 Ethical Use of AI in IoT
7.3 Regulatory Frameworks
7.3.1 Existing Policies and Regulations
7.3.2 Developing Robust Regulatory Frameworks
7.3.2.1 Data Privacy and Security
7.3.2.2 Interoperability Standards
7.3.3 Adaptive and Future-Proof Regulations
7.3.3.1 Dynamic Policy Making
7.3.3.2 Anticipatory Governance
7.4 Technical and Operational Challenges of IoT with Blockchain, 6G and Quantum Computers
7.4.1 Challenges in Quantum Computing with IoT
7.4.2 Challenges in the Deployment of IoT in 6G Networks
7.4.3 Challenges in the Collaboration of Blockchain and IoT Technologies
7.4.4 Interoperability Challenges: IoT, Blockchain, 6G, and Quantum Computers
7.5 Considerations for Implementation
7.5.1 Integration of Technology, Law, and Ethics
7.5.2 Collaboration among Stakeholders
7.5.3 Public Awareness and Education
7.5.3.1 Promoting Technological Literacy
7.5.3.2 Engaging with Society
7.5.4 Ongoing Research Challenges
7.6 Future Directions
7.6.1 Emerging Trends in Technology
7.6.2 Evolving Ethical Frameworks
7.6.2.1 Adaptive Ethical Guidelines
7.6.3 Policy Recommendations
7.7 Conclusion
References
8. Quantum Secured 6G in Precision Healthcare: Future Challenges and Trends
J. Shanthalakshmi Revathy and J. Mangaiyarkkarasi
8.1 Introduction
8.1.1 The Role of Quantum Security in 6G
8.1.2 Importance of Precision Healthcare in the Modern Era
8.2 Quantum Technologies for Securing 6G Networks
8.2.1 Quantum Key Distribution (QKD) in 6G
8.2.2 Quantum Encryption Algorithms for Healthcare Data
8.2.2.1 Quantum Key Distribution (QKD) Algorithms
8.2.2.2 Quantum Homomorphic Encryption (QHE)
8.2.2.3 Quantum-Safe Cryptography Algorithms
8.2.2.4 Post-Quantum RSA and ECC
8.2.3 Challenges in Implementing Quantum Security in 6G Networks
8.3 Integration of 6G in Precision Healthcare
8.3.1 Benefits of 6G for Real-Time Patient Monitoring
8.3.2 Enhancing Telemedicine through 6G Connectivity
8.3.3 Data-Driven Personalized Medicine with 6G
8.4 Challenges in Quantum Secured 6G Networks
8.4.1 Scalability Issues in Quantum Networks
8.4.2 Quantum Threats to Healthcare Data Integrity
8.4.3 Regulatory and Compliance Challenges
8.5 Future Trends in Quantum Secured 6G Healthcare Systems
8.5.1 Evolution of Quantum Communication Protocols
8.5.2 AI and Machine Learning Integration in 6G Healthcare
8.5.3 Global Collaboration for Quantum-Secured 6G Healthcare Solutions
8.6 Case Studies and Applications
8.6.1 Quantum Secured 6G in Remote Surgery
8.6.2 Precision Drug Delivery Systems
8.6.3 Healthcare Data Management and Security
8.7 Conclusion
References
9. An Efficient Net-B0 Deep Learning Model for the Detection of Breast Tumor from Histopathological Images
Monika S., Nagarajan. G. and Perarasi T.
9.1 Introduction
9.2 Related Works
9.2.1 Literature Survey
9.2.2 Dataset Used
9.2.3 Convolutional Neural Network
9.3 Proposed Work
9.3.1 Feature Extraction
9.3.2 Classification
9.4 Results and Discussion
9.5 Conclusion
References
10. Compact MIMO Patch Antenna Design for 6G-Enabled Internet of Medical Things Operating within the IoT Ecosystem
Janani P. and Koushick Venkatesh
10.1 Introduction
10.2 Evolution Stages of 1G to 6G
10.3 6G Medical Improvements that 5G Wouldn’t be Able to Do!
10.4 Future Holds for Wireless Communication Networks with 6G Capability
10.5 IoMT vs IoT in Healthcare
10.6 Challenges in Implementing IoMT
10.7 Importance of IoMT in Antenna
10.7.1 Why MIMO Antenna for IoMT Applications
10.7.2 Importance of MIMO Technologies
10.8 Proposed Design Considerations of the Antenna
10.9 Results and Discussions
10.10 Conclusion
10.10.1 6G Implementation in Rural Areas
10.10.2 Support of AI towards 6G in the Era of Healthcare
10.11 Strengthening Cybersecurity over 6G Antenna
10.12 Future Scope of IoMT Applications
References
11. Quantum-Secure Blockchain: Revolutionizing Security for the 6G IoT
Parthasarathi P., Nivedha S., Krishnamoorthy V. and Priyanga M. A.
11.1 Introduction
11.1.1 Overview of 6G and IoT
11.1.2 Challenges in Securing 6G IoT Networks
11.1.3 Role of Blockchain in Enhancing IoT Security
11.1.4 The Emerging Threat of Quantum Computing
11.2 Foundations of Quantum Computing and Blockchain
11.2.1 Basics of Quantum Computing
11.2.2 Blockchain: Key Principles
11.2.3 Consensus Mechanisms
11.2.4 Cryptographic Underpinnings
11.2.5 Intersection of Quantum Computing and Blockchain
11.3 Quantum Threats to Blockchain and IoT Security
11.3.1 Traditional Cryptographic System Vulnerabilities
11.3.2 Risks to Blockchain Security
11.3.3 Challenges in IoT Security
11.4 Quantum-Resistant Blockchain Technology
11.4.1 Post-Quantum Cryptography (PQC)
11.4.2 Quantum-Safe Consensus Mechanisms
11.4.3 Secure Communication Channels
11.4.4 Role of Zero-Knowledge Proofs (ZKPs)
11.4.5 Prospective Difficulties and Challenges
11.5 Integrating Quantum-Secure Blockchain with 6G IoT
11.5.1 Quantum-Secure IoT Network Architecture
11.5.2 Quantum-Secure Smart Contracts and AR Integration
11.5.3 Data Authentication and Integrity
11.5.4 Decentralized Identity Management (DID)
11.5.5 Smart Contracts for IoT
11.6 Advancements in 6G and Quantum-Resistant IoT Applications
11.6.1 AI-Driven 6G IoT Networks
11.6.2 Real-Time Applications
11.6.3 Energy-Efficient IoT Systems
11.6.4 Cross-Domain Applications
11.7 Challenges in Implementing Quantum-Secure Blockchain for IoT
11.7.1 Scalability Challenges
11.7.2 Computational Overheads
11.7.3 Standardization and Interoperability
11.7.4 Regulatory and Ethical Considerations
11.8 Future Directions
11.8.1 Innovations in Post-Quantum Cryptography
11.8.2 Evolution of 6G IoT Standards
11.8.3 Convergence of Emerging Technologies
11.9 Conclusion
References
12. From Sci-Fi to Reality: Making Secure 6G IoT Applications a Reality
Muhammadu Sathik Raja, Karthikeyan M., K. Syed Ali Fathima and Manoj R.
12.1 Introduction
12.1.1 Evolution of IoT and Communication Technologies
12.1.2 6G: The Next Frontier
12.1.3 Need for Security in 6G IoT Applications
12.1.4 Sci-Fi to Reality: Vision for 6G IoT
12.2 Fundamentals of 6G and IoT
12.2.1 What Defines 6G Technology?
12.2.2 Characteristics of 6G IoT Networks
12.2.3 Comparison of 5G and 6G IoT
12.2.4 Emerging Use Cases for 6G IoT
12.3 Security Challenges in 6G IoT Applications
12.3.1 Expanding Attack Surface
12.3.2 Threats to Privacy and Data Integrity
12.3.3 Quantum Computing Threats
12.3.4 IoT Device Limitations
12.4 Enabling Secure 6G IoT Applications
12.4.1 Advanced Cryptographic Techniques
12.4.2 Distributed Trust Systems
12.4.3 AI-Driven Threat Detection
12.4.4 Quantum-Resistant Communication
12.5 Making Sci-Fi Applications a Reality with 6G IoT
12.5.1 Smart Cities and Infrastructure
12.5.2 Holographic Telepresence
12.5.3 Advanced Healthcare Systems
12.5.4 Autonomous Vehicles and Robotics
12.5.5 Immersive Entertainment and Gaming
12.6 Building a Resilient Security Framework for 6G IoT
12.6.1 Multi-Layered Security Architecture
12.6.2 Zero-Trust Architecture for IoT
12.6.3 Dynamic Access Control
12.6.4 Secure Bootstrapping for IoT Devices
12.7 Global Efforts in 6G Development
12.7.1 Security Standards for 6G IoT
12.7.2 Public-Private Partnerships
12.8 Challenges in Realizing Secure 6G IoT Applications
12.8.1 Scalability and Interoperability
12.8.2 Energy Efficiency in Security Implementations
12.8.3 Ethical and Privacy Concerns
12.8.3.1 Addressing User Consent and Data Protection
12.8.4 Cost and Resource Constraints
12.9 Case Studies and Prototypes
12.9.1 Early Implementations of 6G IoT Applications
12.9.2 Security Incidents and Lessons Learned
12.9.3 Pilot Projects and Experimental Networks
12.10 Future Directions
12.10.1 Convergence of Technologies
12.10.2 Innovations in IoT Security
12.11 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page