A Systematic Literature Review of Blockchain-Enabled Zero Trust Architectures for Secure Non-Terrestrial Networks in 6G Cloud–Edge Environments
Published: 2026/31/03
Abstract
The transition to multi-layered Space-Air-Ground Integrated Networks (SAGIN) from traditional terrestrial infrastructure drastically complicates the security landscape of sixth-generation (6G) networks. In this paper, we conduct a Systematic Literature Review (SLR) evaluation on the synergistic integration of Blockchain and Zero Trust Architecture (ZTA) as two core security pillars for 6G cloud-edge Non-Terrestrial Networks (NTNs). The study investigates the use of Blockchain with Zero Trust Architecture (ZTA) to ensure context-aware access control and continuous authentication, along with decentralized trust and immutability audit property provided by Blockchain. We investigate a variety of hybrid approaches aimed at countering vulnerabilities associated with the decentralized architecture of SAGIN, such as identity spoofing, jamming, and routing attacks through a thematic and quantitative synthesis. Notably, hybrid Blockchain-ZTA-based systems attained maximum attack detection accuracies of 97%, outperforming the best standalone models in addition to requiring a latency (150−300 ms) and resource overhead. This review also explores how AI-integrated 6th-generation features can enhance anomaly detection. It concludes with a clear overview of key research trends, including the scarcity of real-world deployments, and provides a roadmap for future development focused on scalability, consensus optimization, and quantum-resilient cryptography.
Keywords
A Systematic Literature Review of Blockchain-Enabled Zero Trust Architectures for Secure Non-Terrestrial Networks in 6G Cloud–Edge Environments is licensed under CC BY 4.0
References
- Y. Zhang, P. Zhang, M. Guizani, J. Zhang, J. Wang, H. Zhu, K. K. Igore-vich, and H. Shi, “Blockchain-based secure communication of internet of things in space–air–ground integrated network,” Future Generation Computer Systems, vol. 158, pp. 391–399, 2024.https://doi.org/10.1016/j.future.2024.04.024
- W. Zhao, S. Yang, and X. Luo, “Blockchain-facilitated cybersecurity for ubiquitous internet of things with space–air–ground integrated networks: A survey,” Sensors, vol. 25, no. 2, p. 383, 2025.https://doi.org/10.3390/s25020383
- S. Nie, J. Ren, R. Wu, P. Han, Z. Han, and W. Wan, “Zero-trust access control mechanism based on blockchain and inner-product encryption in the internet of things in a 6g environment,” Sensors, vol. 25, no. 2, p. 550, 2025. https://doi.org/10.3390/s25020550
- S. Dang, O. Amin, B. Shihada, and M.-S. Alouini, “What should 6g be?” Nature Electronics, vol. 3, no. 1, pp. 20–29, 2020.https://doi.org/10.1038/s41928-019-0355-6
- M. Giordani and M. Zorzi, “Non-terrestrial networks in the 6g era: Challenges and opportunities,” IEEE network, vol. 35, no. 2, pp. 244–251, 2020.https://doi.org/10.1109/mnet.011.2000493
- H. Cui, J. Zhang, Y. Geng, Z. Xiao, T. Sun, N. Zhang, J. Liu, Q. Wu, and X. Cao, “Space-air-ground integrated network (sagin) for 6g: Requirements, architecture and challenges,” China Communications, vol. 19, no. 2, pp. 90–108, 2022.https://doi.org/10.23919/jcc.2022.02.008
- M. Satyanarayanan, “The emergence of edge computing,” Computer, vol. 50, no. 1, pp. 30–39, 2017.https://doi.org/10.1109/mc.2017.9
- Y. Liu, S. Peng, M. Zhang, S. Shi, and J. Fu, “Towards secure and efficient integration of blockchain and 6g networks,” Plos one, vol. 19, no. 4, p. e0302052, 2024.https://doi.org/10.1371/journal.pone.0302052
- C.-X. Wang, X. You, X. Gao, X. Zhu, Z. Li, C. Zhang, H. Wang, Y. Huang, Y. Chen, H. Haas et al., “On the road to 6g: Visions, requirements, key technologies, and testbeds,” IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 905–974, 2023.https://doi.org/10.1109/comst.2023.3249835
- Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6g wireless networks: Vision, requirements, architecture, and key technologies,” IEEE vehicular technology magazine, vol. 14, no. 3, pp. 28–41, 2019.https://doi.org/10.1109/mvt.2019.2921208
- W. Saad, M. Bennis, and M. Chen, “A vision of 6g wireless systems: Applications, trends, technologies, and open research problems,” IEEE network, vol. 34, no. 3, pp. 134–142, 2019. https://doi.org/10.1109/mnet.001.1900287
- I. F. Akyildiz, C. Han, Z. Hu, S. Nie, and J. M. Jornet, “Terahertz band communication: An old problem revisited and research directions for the next decade,” IEEE Transactions on Communications, vol. 70, no. 6, pp. 4250–4285, 2022.https://doi.org/10.1109/tcomm.2022.3171800
- H. Chen, H. Sarieddeen, T. Ballal, H. Wymeersch, M.-S. Alouini, and T. Y. Al-Naffouri, “A tutorial on terahertz-band localization for 6g communication systems,” IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1780–1815, 2022.https://doi.org/10.1109/comst.2022.3178209
- M. Ahmed, A. Wahid, W. U. Khan, F. Khan, A. Ihsan, Z. Ali, K. M. Rabie, T. Shongwe, and Z. Han, “A survey on ris advances in terahertz communications: Emerging paradigms and research frontiers,” IEEE Access, vol. 12, pp. 173 867–173 901, 2024.https://doi.org/10.1109/access.2024.3482564
- M. N. A. Siddiky, M. E. Rahman, M. S. Uzzal, and H. D. Kabir, “A comprehensive exploration of 6g wireless communication technologies,” Computers, vol. 14, no. 1, p. 15, 2025.https://doi.org/10.3390/computers14010015
- K. Meng, C. Masouros, K.-K. Wong, A. P. Petropulu, and L. Hanzo, “Integrated sensing and communication meets smart propagation engineering: Opportunities and challenges,” IEEE Network, 2025.https://doi.org/10.1109/mnet.2025.3527130
- J. A. Zhang, M. L. Rahman, K. Wu, X. Huang, Y. J. Guo, S. Chen, and J. Yuan, “Enabling joint communication and radar sensing in mobile networks—a survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 306–345, 2021.https://doi.org/10.1109/comst.2021.3122519
- E. Shtaiwi, A. Abdelhadi, H. Li, Z. Han, and H. V. Poor, “Orthogonal time frequency space for integrated sensing and communication: A survey,” arXiv preprint arXiv:2402.09637, 2024. https://doi.org/10.48550/arXiv.2402.09637
- S. N. Sur, A. K. Singh, H. Q. Tran, P. Vishwakarma, A. L. Imoize, and C.-T. Li, “A state-of-the-art survey on irs-noma for integrated sensing and communication,” IEEE Access, 2024.https://doi.org/10.1109/access.2024.3512998
- A. H. Alaraj, “Advancing cloud adoption in the saudi public sector: Challenges, global insights, and strategic policy recommendations,” ESI Preprints (European Scientific Journal, ESJ), vol. 41, pp. 627–627, 2025. https://doi.org/10.19044/esipreprint.5.2025.p627
- R. B. Alzahrani, “An overview of ai data protection in the context of saudi arabia,” International Journal for Scientific Research, vol. 3, no. 3, pp. 199–218, 2024.https://doi.org/10.59992/ijsr.2024.v3n3p8
- H. Luo, X. Yang, H. Yu, G. Sun, B. Lei, and M. Guizani, “Performance analysis and comparison of nonideal wireless pbft and raft consensus networks in 6g communications,” IEEE Internet of Things Journal, vol. 11, no. 6, pp. 9752–9765, 2023.https://doi.org/10.1109/jiot.2023.3323492
- F. A. Dicandia, N. J. Fonseca, M. Bacco, S. Mugnaini, and S. Genovesi, “Space-air-ground integrated 6g wireless communication networks: A review of antenna technologies and application scenarios,” Sensors, vol. 22, no. 9, p. 3136, 2022.https://doi.org/10.3390/s22093136
- F. Wang, S. Zhang, H. Yang, and T. Q. Quek, “Non-terrestrial networking for 6g: Evolution, opportunities, and future directions,” Engineering, 2025. https://doi.org/10.1016/j.eng.2025.05.013
- S. A. Abdel Hakeem, H. H. Hussein, and H. Kim, “Security requirements and challenges of 6g technologies and applications,” Sensors, vol. 22, no. 5, p. 1969, 2022.https://doi.org/10.3390/s22051969
- Y. Liu, X. Xing, Z. Tong, X. Lin, J. Chen, Z. Guan, Q. Wu, and W. Susilo, “Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2603–2618, 2023.https://doi.org/10.1109/tdsc.2023.3313799
- Y. Zhao, J. Zhao, L. Jiang, R. Tan, D. Niyato, Z. Li, L. Lyu, and Y. Liu, “Privacy-preserving blockchain-based federated learning for iot devices,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1817–1829, 2020. https://doi.org/10.1109/jiot.2020.3017377
- R. Radu, “Steering the governance of artificial intelligence: national strategies in perspective,” Policy and society, vol. 40, no. 2, pp. 178–193, 2021.https://doi.org/10.1080/14494035.2021.1929728
- X. Chen, W. Feng, N. Ge, and Y. Zhang, “Zero trust architecture for 6g security,” IEEE network, vol. 38, no. 4, pp. 224–232, 2023.https://doi.org/10.1109/mnet.2023.3326356
- A. Hussain, S. Li, T. Hussain, R. W. Attar, A. Alhomoud, R. Alsagri, and A. A. Alzubi, “Blockchain-enabled zero trust-based secure and energy efficient scheme for 6g-enabled uasns,” Journal of Cloud Computing, vol. 14, no. 1, p. 21, 2025.https://doi.org/10.1186/s13677-025-00744-x
- H. Sedjelmaci, K. Tourki, and N. Ansari, “Enabling 6g security: The synergy of zero trust architecture and artificial intelligence,” IEEE Network, vol. 38, no. 3, pp. 171–177, 2023. https://doi.org/10.1109/mnet.2023.3326003
- T. N. Turnip, B. Andersen, and C. Vargas-Rosales, “Towards 6g authentication and key agreement protocol: A survey on hybrid post quantum cryptography,” IEEE Communications Surveys & Tutorials, 2025. https://doi.org/10.1109/comst.2025.3567439
- A. Ali and I. Khan, “Skytrust: Blockchain-enhanced uav security for ntns with dynamic trust and energy-aware consensus,” arXiv preprint arXiv:2508.18735, 2025.https://doi.org/10.22541/au.175559616.64842559/v1
- F. Raheman, “From standard policy-based zero trust to absolute zero trust (azt): a quantum leap to q-day security,” Journal of Computer and Communications, vol. 12, no. 3, pp. 252–282, 2024.https://doi.org/10.4236/jcc.2024.123016
- A. Ali, “Adaptive and Context-Aware Authentication Framework Using Edge AI and Blockchain in Future Vehicular Networks,” STAP Journal of Security Risk Management, vol. 2024, no. 1, pp. 45–56, 2024, doi: 10.63180/jsrm.thestap.2024.1.3.
- Chandak, A., & Chandak, P. (2026). Blockchain technology in health care an extensive scoping review of the existing applications, challenges, and future directions. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- S. R. Addula, S. Norozpour, and M. Amin, “Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing,” Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 38–48, 2025, doi: 10.63180/jjic.thestap.2025.1.5.
- D. Abu Laila, “Responsive Machine Learning Framework and Lightweight Utensil of Prevention of Evasion Attacks in the IoT-Based IDS,” STAP Journal of Security Risk Management, vol. 2025, no. 1, pp. 59–70, 2025, doi: 10.63180/jsrm.thestap.2025.1.3.
- Ibrahim, A., Kadhim, A. F., Hamzah, A. E., & Al-Shareeda, M. A. (2026). A Secure and Scalable IoT Home Automation Architecture with Web and Biometric Control. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- M. Alshinwan, A. G. Memon, M. C. Ghanem, and M. Almaayah, “Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering,” Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 27–36, 2025. doi: 10.63180/jjic.thestap.2025.1.4.
- D. Abu Laila, M. Aljawarneh, Q. Al-Na’amneh, and R. Bin Sulaiman, “Optimizing intrusion detection systems through benchmarking of ensemble classifiers on diverse network attacks,” STAP Journal of Security Risk Management, vol. 2025, no. 1, pp. 71–84, 2025. doi: 10.63180/jsrm.thestap.2025.1.4.
- Alsahaim, S., Almaiah, M. A., & Sulaiman, R. B. (2023). Security Threats in Mobile Phones: Challenges, Countermeasures, and the Importance of User Awareness. International Journal of Cybersecurity Engineering and Innovation, 2023(1).
- K. Audah Kareem and M. A. Al-Shareeda, “A Low-Complexity Li-Fi Communication Framework for Short-Range Text Transmission,” Jordanian Journal of Informatics and Computing, vol. 2026, no. 1, pp. 15–24, 2026, doi: 10.63180/jjic.thestap.2026.1.2.
- Alrajeh, M., Almaiah, M., & Mamodiya, U. (2026). Cyber Risk Analysis and Security Practices in Industrial Manufacturing: Empirical Evidence and Literature Insights. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- Q. Al-Na’amneh, M. Aljawarneh, A. S. Alhazaimeh, R. Hazaymih, and S. M. Shah, “Securing trust: Rule-based defense against on/off and collusion attacks in cloud environments,” STAP Journal of Security Risk Management, vol. 2025, no. 1, pp. 85–114, 2025. doi: 10.63180/jsrm.thestap.2025.1.5.
