1. Introduction
The emergence of 6G networks marks a transformative era for Cyber-Physical Systems (CPS), enabling ultra-reliable, low-latency communication, massive device connectivity, and data transfer rates exceeding 1 Tbps [
1]. These advancements position 6G-enabled CPS as critical infrastructures across diverse domains, including healthcare, smart cities, industrial automation, and autonomous systems [
2]. With an anticipated 100 billion connected devices by 2030 and 6G latency as low as 1 millisecond, CPS will be capable of real-time responsiveness and unprecedented scalability [
3]. However, these advancements also introduce significant security and operational challenges due to expanded attack surfaces, decentralized architectures, and heterogeneous device environments [
4]. Traditional perimeter-based security models are inadequate in dynamic 6G environments, leaving systems vulnerable to Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), data breaches, and advanced persistent threats (APTs) [
5]. The growing complexity of security threats in 6G CPS necessitates a paradigm shift towards Zero Trust Security—a model based on continuous authentication, strict access control, and least-privilege principles [
6].
To address these challenges, this paper proposes an integrated Zero Trust Security framework for 6G-enabled CPS, incorporating blockchain-based authentication and AI-driven anomaly detection to enhance security, scalability, and real-time threat mitigation [
7]. Blockchain ensures tamper-proof data integrity, mitigating risks associated with data manipulation, unauthorized access, and cyberattacks [
8]. Additionally, AI-powered anomaly detection is employed to dynamically identify and mitigate evolving cyber threats such as behavioral anomalies, network intrusions, and insider threats [
9]. The proposed framework also addresses energy efficiency and resource constraints, ensuring low-latency decision-making and optimized security performance [
10]. This is particularly crucial for applications in remote healthcare monitoring, autonomous industrial control systems, and intelligent transportation networks [
11]. By integrating these advanced security strategies, the proposed solution ensures secure, scalable, and efficient CPS operations in next-generation 6G networks, making it a fundamental enabler for sustainable, resilient, and intelligent cyber-physical ecosystems [
12].
Moreover, there are challenges from the data integrity, secure communication, and system reliability aspects in real time operations. MITM attacks, which compromise sensitive data, are still a persistent threat in distributed networks for example. Additionally, the integration of large-scale CPS deployments into 6G will need to address scalability challenges as the network loads and device densities increase [
13]. Worst still, we lack adaptive access controls and security data management mechanisms to compound these vulnerabilities.
As 6G networks are rapidly developing, they provide unprecedented capabilities for Cyber Physical Systems (CPS), including ultra-low latency, massive connectivity, and high-speed data throughput, which are critical for healthcare [
14], smart cities, and industrial automation. Threats include Distributed Denial of Service (DDoS) attacks, data breaches, and advanced persistent threats (APTs), even though these too are only offerings that are being made available to the public. Traditional security models cannot account for the dynamic, heterogeneous, distributed nature of 6G enabled CPS, and thus need to adopt Zero Trust principles. However, while blockchain and AI-driven anomaly detection are promising security technologies, they both face challenges of scalability [
15], energy efficiency, and real time performance. The need to develop an integrated Zero Trust framework that blends blockchain for secure data management and AI for real time threat detection is driving this research in order to create scalable, secure, and efficient CPS architectures that meet the needs of 6G environments.
The emergence of 6G networks heralds unprecedented opportunities for Cyber Physical Systems (CPS) with real time responsiveness and ultra-high-speed communication, as well as massive scalability. Meanwhile, these advancements render the dynamic, distributed, and high-density nature of 6G enabled CPS susceptible to vulnerabilities that traditional security mechanisms fail in addressing. This is crucial in domains like healthcare, smart cities, and others, because security breaches have very high consequences [
16]. Current solutions, such as blockchain and anomaly detection systems, face limitations in scalability, energy efficiency, and real-time threat mitigation. The first aim of this research is to develop an integrated Zero Trust framework based on blockchain and an AI driven anomaly detection to resolve these challenges [
17]. The solution proposed will guarantee robust security, resource optimization, and scalability, and therefore will lead to the development of secure and efficient CPS infrastructure in 6G networks. The work presented in this research is of critical importance for protecting critical systems while providing the opportunity for sustainable and scalable implementation for future technological and security challenges [
18,
19].
Problem Formulation 1: Challenges in 6G Enabled CPS Security Frameworks
Security frameworks are a critical challenge to scalability in 6G enabled Cyber Physical Systems (CPS) because the number of inter-connected devices and the amount of data generated grows exponentially. However, existing security mechanisms like blockchain based authentication and anomaly detection are high latency bottlenecks, computationally expensive, and energy inefficient as the network size increases. The challenge is to provide a scalable, resource efficient, and secure framework that provides real time threat mitigation while maintaining high throughput and low latency.
Let the 6G-enabled CPS consist of devices, each generating data packets at a rate (packets/second). The system operates over a set of communication channels with bandwidth (Mbps) for each channel. The blockchain security mechanism is represented by a distributed ledger, and the anomaly detection system processes incoming data streams from each device.
The total communication delay
is given by:
where
is the size of the data packet generated by device
.
The computational overhead
for blockchain verification is:
where
is the total number of blocks in the ledger,
is the weight of block
, and
is the hash computation time for block
.
The energy consumption
for processing and transmitting data is:
where
and
are the processing and transmission power for device
, respectively.
To address the scalability challenge, the following objectives are defined:
: Total number of devices in the CPS.
: Total number of communication channels.
: Data generation rate for device (packets/s).
: Bandwidth of communication channel (Mbps).
: Data packet size generated by device (bytes).
: Blockchain ledger storing security data.
: Hash of block in the blockchain ledger.
: Weight associated with block for computational cost.
: Processing power of device (mW).
: Transmission power of device (mW).
: Total communication delay (ms).
: Computational overhead for blockchain verification.
: Total energy consumption (mW).
The scalability of security frameworks in 6G-enabled CPS is constrained by three interrelated factors: communication delay, computational overhead, and energy consumption. With the growing number of devices and data traffic, the communication delay is induced by limited channel bandwidth and high data generation rates. At the same time, blockchain based security mechanisms achieve stronger data integrity at the cost of high computational costs in block verification. Furthermore, the energy consumption of transmitting data and processing data grows exponentially with the scale of the network, rendering these frameworks infeasible for resource constrained CPS environments. The objective functions strive to optimize these factors by reducing delays, computational overheads, and energy consumption, making 6G enabled CPSs scalable, secure, and efficient security frameworks.
Problem Formulation 2: Real time security and threat detection are key challenges faced by 6G enabled Cyber Physical Systems (CPS)
Particularly in applications of healthcare and industrial automation, where unnecessary delays or undetected threats can result in grave consequences. However, the computational complexity and resource demands of traditional anomaly detection mechanisms do not meet the stringent latency and accuracy requirements of 6G. Moreover, threat landscapes in 6G networks are dynamic and evolving, and hence require adaptive and low latency frameworks for real time threat mitigation. The objective here is to develop a reliable and adaptable threat detection mechanism that minimizes detection latency and maximizes detection accuracy while remaining energy efficient in resource constrained settings.
Let the data streams from devices be represented as , where is the dimensionality of the feature space. The anomaly detection model predicts the probability of an anomaly for each device. The model processes data at the edge nodes with limited computational resources for edge nodes.
Detection Latency (
): The total detection latency is given by:
where
is the size of the input data,
is the bandwidth allocated to device
, and
is the computation time at the edge node.
Detection Accuracy (
): The accuracy of the anomaly detection system is defined as:
where
is an indicator function that evaluates to 1 if the predicted label matches the true label.
Energy Consumption (
): The energy consumption for processing and transmitting data is given by:
where
is the data transmission time, and
and
are the processing and transmission power for device
, respectively.
The objectives for ensuring real-time security and threat detection in 6G CPS are:
: Total number of devices in the CPS.
: Data stream from device at time .
: Anomaly detection model with parameters .
: Probability of anomaly for device .
: Size of the input data from device .
: Bandwidth allocated to device .
: Computation time for anomaly detection at the edge node.
: Processing power of device (mW).
: Transmission power of device (mW).
: Data transmission time for device .
: Accuracy of the anomaly detection system.
: Total energy consumption for threat detection.
Ensuring real-time security and threat detection in 6G CPS requires balancing three key factors: detection latency, detection accuracy, and energy consumption. Bandwidth limitations and processing constraints lead to limitations at edge nodes that hinder performance, and detection latency is a function of communication delays and computational delays at edge nodes. Detecting true threat is vital to the minimization of false positives and negatives and translating these words into a behavior in a timely and reliable manner. In resource constrained environments, energy consumption is a major concern for anomaly detection systems since too much power consumption can render the systems inoperable. This research aims to develop a robust framework through which these factors can be optimized by carefully designed objective functions to effect adaptive, efficient, and real time threat detection for 6G CPS.
This research aims to build an integrated Zero Trust framework for 6G enabled CPSs that is scalable, secure, and efficient. The specific objectives are:
Creating a scalable security architecture that would protect users in these high density 6G networks with low latency and overhead.
Integrate blockchain-based authentication and AI-driven anomaly detection for real-time threat mitigation.
Optimize resource allocation to minimize energy consumption in resource-constrained CPS environments.
Evaluate the framework using performance metrics such as latency, accuracy, scalability, and energy efficiency.
We propose to optimize security, responsiveness, and resource efficiency in heterogeneous CPS.
In total, these objectives collectively overcome the limitations of current security frameworks and present a robust, adaptive, and efficient solution for the next generation of CPS in 6G networks. This research makes the following contributions to the field of secure 6G-enabled Cyber-Physical Systems (CPS):
Proposing a scalable Zero Trust security framework leveraging blockchain and AI-driven anomaly detection.
Developing an energy-efficient resource allocation strategy tailored for CPS environments.
Evaluating system performance using security and scalability metrics such as MITM attack resistance, authentication efficiency, and network latency.
A comprehensive evaluation of the proposed framework is provided using metrics such as latency, scalability, energy consumption, and detection accuracy for different network scenarios.
Provide for the presentation of new optimization techniques for security, real-time responsiveness, and resource efficiency to strike an appropriate balance between security and real time responsiveness in critical 6G-enabled CPS applications like healthcare and smart cities.
Unlike existing blockchain-AI security models, which often operate independently or in isolated domains, the proposed Zero Trust framework integrates permissioned blockchain-based authentication, AI-driven anomaly detection, and adaptive access control into a cohesive security architecture for 6G-enabled CPS. While prior works have employed blockchain primarily for ensuring data integrity or AI for intrusion detection, our framework utilizes Hyperledger Fabric—a permissioned blockchain—to enable secure and tamper-resistant identity management. Although not fully decentralized, Hyperledger Fabric provides a distributed and verifiable authentication infrastructure governed by a consortium model, thereby reducing reliance on single-point-of-failure centralized authorities. AI-based anomaly detection is deployed at the network edge, facilitating real-time threat identification and mitigation. Moreover, our Adaptive Role-Based Access Control (RBAC) system dynamically modifies access permissions based on continuous contextual risk assessment, enforcing least-privilege policies and real-time verification. The integration of Kyber-PQC for quantum-resistant key exchange further enhances the cryptographic resilience of the framework. Collectively, these technologies contribute to a scalable, efficient, and security-optimized Zero Trust framework capable of supporting low-latency and high-density 6G CPS deployments.
This study employs a customized Adaptive Role-Based Access Control (RBAC) mechanism designed specifically for the unique requirements of 6G-enabled Cyber-Physical Systems (CPS). Unlike conventional RBAC models that rely on static user-role-permission mappings, our approach dynamically adjusts access policies in real time based on contextual factors such as network behavior, device activity, and current threat levels as detected by the AI anomaly detection system. While traditional RBAC schemes have been used in enterprise IT systems, their application in high-density, low-latency CPS environments remains limited. Previous work has largely focused on static role hierarchies or attribute-based access control (ABAC), which may not scale effectively in dynamic and resource-constrained CPS deployments. To the best of our knowledge, this is the first implementation of an adaptive, AI-integrated RBAC framework tailored for Zero Trust security in 6G-enabled CPS, using real-time risk assessment to enforce least-privilege access policies. The results presented in this study were achieved using this in-house developed RBAC module, integrated into the broader SmartCare framework, and evaluated for responsiveness, accuracy, and access enforcement under varying network conditions.
The proposed framework integrates an energy-efficient resource allocation approach that optimizes data transmission, computation, and security enforcement. Instead of relying on a standalone resource allocation algorithm, the system dynamically distributes computational tasks between edge nodes and cloud resources, minimizing energy consumption while maintaining robust security enforcement. By employing adaptive access control policies and lightweight cryptographic techniques, the framework achieves low-latency security operations and ensures scalability across high-density 6G CPS deployments, striking a balance between performance and sustainability.
This paper is organized as follows: In
Section 1, the research problem is presented, including the challenges and the objectives of achieving secure and scalable 6G enabled Cyber Physical Systems (CPS).
Section 2 reviews the existing literature on Zero Trust security, blockchain, and AI driven anomaly detection in CPS and highlights the main gaps. In
Section 3, the proposed methodology is outlined, including mathematical formulations, objective functions, and integrated framework design. The results and discussion of the proposed solution are presented in
Section 4, where the proposed solution is evaluated by metrics such as latency, accuracy, scalability, and energy efficiency. In
Section 5, we conclude the paper by summarizing the key findings and moving forward with future research.
3. Methodology
The methodology describes how the systematic approaches used in this study led to the research objectives. It includes information about the implementation of the experimental setup, tools, and data collection as well as analysis procedures. The goal is to ensure the replicability and reliability of the results obtained.
3.1. Dataset Collection
This study used publicly available repositories (
https://www.kaggle.com/datasets/teamincribo/cyber-security-attacks, accessed on 12 February 2025) to collect the dataset used, and supplemented the data with simulated data to meet specific research requirements. Features from 6G enabled CPS environments, including system performance features of latency, throughput, and device activity, are collected. To obtain diverse data, samples were collected in different scenarios, namely normal operations, network congestion, and simulated attack. The dataset was preprocessed, and inconsistencies were removed to normalize feature scales, to make it suitable for subsequent analysis.
3.2. Dataset Description
Real world and synthetic data are combined to produce the dataset that is used in this study for analyzing performance metrics in 6G enabled CPS environments. It contains collected key attributes, including latency, throughput, device activity, and network traffic patterns across diverse operating conditions. System performance scenarios were sourced from publicly available repositories for real world data. Moreover, synthetic data were generated to test edge cases such as network congestion and cyber-attacks to make sure that any analysis is robust. The dataset consists of over 10,000 instances, and each instance has been labeled to represent those specific conditions of normal operation, bottleneck scenarios, or security breach. We removed duplicates, handled missing values, and normalized the data to make sure all features are uniform. The reliability of these models, and their ability to support rigorous testing of Zero Trust strategies in CPS environments, are supported by the structured and comprehensive nature of this dataset, and by providing a way to evaluate the scalability and security of these strategies.
Table 2 summarizes the dataset attributes used in this study, including key system performance metrics and security-related parameters collected during experimental evaluation.
This study leverages a combination of real-world and synthetic datasets to evaluate the performance of the proposed Zero Trust framework in 6G-enabled Cyber-Physical Systems (CPS). The dataset includes key system performance attributes such as latency, throughput, device activity, and network traffic patterns across diverse operating conditions. To ensure a comprehensive evaluation, real-world data were collected from publicly available repositories, while synthetic data were generated to simulate various challenging scenarios, including network congestion and cyber-attacks. For the simulation of cyber-attacks, we utilized a custom-built attack generation framework based on the Scapy packet manipulation tool and an NS-3 network simulation environment. The framework was used to simulate Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data injection threats, ensuring a diverse range of adversarial conditions. These attacks were crafted to replicate real-world threats faced by 6G-enabled CPS in smart cities, healthcare, and industrial automation. The dataset consists of over 10,000 instances, with each instance labeled according to its specific operational state—normal operation, network congestion, or security breach. To maintain data consistency and integrity, preprocessing steps were applied, including duplicate removal, missing value handling, and feature normalization. This structured dataset serves as a strong foundation for evaluating scalability, security, and real-time threat detection under Zero Trust strategies in 6G-enabled CPS environments.
The dataset used in this study consists of a combination of real-world data from publicly available 6G-enabled CPS repositories and synthetic data generated through the NS-3 network simulation framework. The real-world data were collected from IoT-based CPS infrastructures, smart city sensor networks, and industrial automation systems, reflecting actual operational conditions. The synthetic data were introduced to ensure comprehensive testing under diverse scenarios, including cyber threats and high network load conditions.
The dataset includes over 10,000 labeled instances, categorized into the following operational scenarios:
Normal operations—Capturing baseline network behavior under standard conditions.
Network congestion scenarios—Simulating real-world traffic spikes and high-density device environments.
Simulated cyber-attacks—Injecting adversarial events, including Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data injection threats.
Device activity logs—Recording IoT communication patterns, sensor interactions, and response times.
Security incident logs—Providing labeled instances of anomalies detected by AI-based threat detection models.
To ensure data quality and consistency, preprocessing techniques were applied, including duplicate removal, feature normalization, missing value handling, and data standardization. The dataset has been structured for efficient training and evaluation of Zero Trust security mechanisms, allowing reproducibility of experiments.
For anomaly detection, this study utilizes a Deep Learning-based Autoencoder, trained to identify deviations in real-time network behavior. The blockchain implementation is based on Hyperledger Fabric, ensuring decentralized authentication and tamper-proof data storage. The authentication scheme used is the Elliptic Curve Digital Signature Algorithm (ECDSA), integrated with blockchain-based verification for secure identity management. Furthermore, Post-Quantum Cryptography (PQC) is incorporated using the Kyber lattice-based encryption scheme, providing a quantum-resistant key exchange mechanism.
While the proposed framework incorporates Post-Quantum Cryptography (PQC) as a forward-compatible security enhancement, it is crucial to delineate its precise role and implications. In this research, the Kyber Key Encapsulation Mechanism (KEM) was employed for quantum-resistant key exchange, aligning with the transition to ML-KEM, as recently standardized by NIST. Kyber’s selection is motivated by its design as a drop-in replacement for traditional key exchange protocols like ECDH, thereby enabling seamless integration into 6G-enabled CPS without major architectural modifications. However, it is important to clarify that Kyber only secures confidentiality by establishing a shared secret; it does not provide authentication or data integrity. In our framework, authentication is achieved using Elliptic Curve Digital Signature Algorithm (ECDSA), which—unlike Kyber—remains susceptible to quantum adversaries through Shor’s algorithm. This introduces a partial vulnerability in the blockchain component, where integrity and non-repudiation depend on post-quantum insecure signatures. As such, while the framework ensures quantum-resistant confidentiality, the overall post-quantum security is incomplete, particularly regarding authentication and integrity within the blockchain. This limitation is non-trivial and reflective of the broader state of PQC integration in security architectures, where hybrid models are still evolving. Moreover, Kyber’s computational and memory overheads are significantly higher than classical key exchange methods, raising concerns for its deployment in resource-constrained CPS edge devices. Given the limited PQ support in blockchain infrastructures and the performance-cost trade-offs in real-time environments, the inclusion of PQC in this work serves not as a core solution but rather as a preliminary investigation into quantum-resilient communication, paving the way for future integration of standardized, efficient post-quantum signature schemes.
3.3. Proposed Model: SmartCare—A Cyber-Physical System Framework for 6G-Enabled Healthcare
The SmartCare framework employs the capabilities of 6G enabled Cyber Physical Systems (CPS) to disrupt healthcare delivery. SmartCare integrates IoT devices, ultra-reliable 6G networks, edge computing, artificial intelligence, and blockchain to provide real time monitoring, improved security, and predictive healthcare services.
The proposed framework incorporates an energy-efficient resource allocation strategy by dynamically distributing computational tasks between edge nodes and cloud resources, ensuring minimal power consumption without compromising security. Unlike traditional centralized security models, which rely on high-power processing at cloud servers, our approach delegates real-time security enforcement to edge nodes, leveraging blockchain authentication and AI-powered anomaly detection. This reduces cloud dependency, optimizes processing overhead, and ensures low-latency security execution. By integrating lightweight cryptographic operations and adaptive access control policies, the framework significantly reduces computational energy costs, making it scalable and sustainable for high-density 6G CPS environments.
IoT-Enabled Medical Devices: Parameters of health, like ECG, blood pressure, glucose levels, oxygen saturation, and body temperature, are collected by wearable sensors and biosensors. The devices are intended for continuous monitoring and data transmission.
6G Wireless Infrastructure: 6G networks provide ultra-low latency, high-speed communication so that data can be transferred seamlessly between IoT devices, edge nodes, and cloud systems.
Edge Computing Nodes: Local processing and analysis are performed at edge nodes, reducing communication latency and enabling real time anomaly detection.
Encryption: To ensure data confidentiality, this research incorporates end-to-end encryption using AES-256 for data encryption and Kyber-PQC for key exchange. The combination of these encryption mechanisms prevents unauthorized access and secures data transmission between CPS devices in 6G networks. This encryption framework complements Zero Trust security by ensuring that even if a network breach occurs, data confidentiality remains uncompromised.
AI Model for Anomaly Detection: The anomaly detection mechanism in SmartCare utilizes a Deep Learning-based Autoencoder trained on historical network behavior patterns. The model detects deviations in real-time by reconstructing expected inputs and comparing them with actual data streams. The autoencoder is optimized for low-latency execution on edge computing nodes to ensure real-time threat detection.
Blockchain Implementation: The blockchain utilized in this study is based on Hyperledger Fabric, a permissioned ledger framework that ensures tamper-resistant storage of authentication logs and anomaly reports. Unlike public blockchain models, Hyperledger Fabric offers lower computational overhead, making it suitable for resource-constrained 6G CPS environments.
Healthcare Dashboard: Healthcare providers get real time insights, alerts, and AI driven recommendations in a secure and intuitive dashboard.
3.4. Mathematical Model
Figure 1 shows the A Cyber-Physical System Framework for 6G-Enabled Healthcare. The SmartCare framework integrates various mathematical formulations to model its components:
3.4.1. Data Acquisition
Each IoT-enabled device collects health parameters. Let
represent the
-th parameter collected by the
-th device at time
, where
and
. The collected data matrix at time
is:
3.4.2. Preprocessing and Feature Extraction
The edge nodes apply preprocessing to normalize and filter the collected data. Normalized data
are computed as:
where
and
are the mean and standard deviation of the
-th parameter, respectively.
3.4.3. Communication Latency
The total communication latency,
, in the 6G network is given by:
Each component is calculated as:
where
and
are the sizes of the uplink data and downlink response, respectively, and
and
are the respective bandwidths.
3.4.4. AI-Based Decision Making
AI models analyze the preprocessed data to detect anomalies or predict risks. A multi-class classification model computes probabilities for
possible outcomes:
where
are the weights corresponding to class
.
3.4.5. Blockchain Security
The blockchain generates a hash for each block of data:
where
is the data block,
is the hash of the previous block, and | | denotes concatenation.
We show below Algorithm 1 for SmartCare workflow.
Algorithm 1: SmartCare Workflow |
Input: IoT data , 6G network parameters, AI model . Output: Real-time insights and healthcare recommendations. Initialize edge nodes and cloud servers. For each time step t, do
- a.
Collect data from IoT devices. - b.
Normalize and preprocess data:
- i.
.
- c.
Transmit to edge nodes. - d.
Compute latency using Equation (3). - e.
Perform edge-level anomaly detection:
- i.
- ii.
If anomaly detected, then
- 1.
Alert healthcare providers via the dashboard.
- iii.
Else
- 1.
Forward processed data to the cloud for advanced analytics.
- f.
Store data securely using blockchain. - g.
Return insights and recommendations.
|
Several evaluation metrics are used to assess the performance of the proposed SmartCare framework. These metrics are used to measure the effectiveness, efficiency, and security of the system at the communication, edge processor, AI analytics, and data security components. The detailed evaluation metrics are described below:
Latency (ms): It measures the time taken for data transmission, processing, and a response being generated. Lower latency means better system performance.
Throughput (Mbps): It is a measure of the amount of network data that is successfully received over the network in a certain period of time. Higher throughput ensures reliable communication.
Accuracy (%): This is the real correctness of the AI model that decides or finds society health condition or anomaly.
Precision and Recall: That is where precision and recall come in. Precision is the proportion of correctly identified positive cases of the predicted positives and recall is the proportion of the correctly identified positive cases among the true positives.
F1-Score: By returning the harmonic mean of precision and recall, a balanced view of the AI model performance is given.
Blockchain Overhead (%): It measures the amount of additional computational and communication cost that blockchain security brings.
Energy Consumption (mW): Assesses the energy usage of IoT devices, edge nodes, and communication infrastructure with the goal of energy efficiency.
Data Integrity (%): It guarantees that patient data are not tampered with during transmitting or storage.
Techniques Used
This research employs a Zero Trust security framework utilizing an Adaptive Role-Based Access Control (RBAC) system for least-privilege access enforcement and continuous authentication. AES-256 is used for symmetric encryption, ensuring data confidentiality, while Kyber-PQC, a lattice-based post-quantum cryptographic method, is applied for secure key exchange. Authentication is strengthened using the Elliptic Curve Digital Signature Algorithm (ECDSA) integrated with blockchain-based verification for tamper-resistant identity management.
To detect security threats in real time, this study implements AI-driven anomaly detection using a Deep Learning-based Autoencoder, which monitors network traffic patterns to identify cyber threats. The blockchain component is built on Hyperledger Fabric, a permissioned blockchain framework, ensuring decentralized authentication and secure data integrity. Together, these technologies establish a scalable, efficient, and adaptive security architecture for 6G-enabled CPS environments.