TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal


Advanced Cybersecurity and Surveillance Frameworks for 5G–IoT Ecosystems: Integrating Web 3.0, Blockchain, and Zero Trust Architecture


Ayushi Srivastava
Department of Computer Science and Information Systems, Shri Ramswaroop Memorial University, UP, India

Author

Megha Agarwal
Department of Computer Science and Information Systems, Shri Ramswaroop Memorial University, UP, India

Author


πŸ“Œ DOI: https://doi.org/10.63920/tjths.44008

πŸ”‘ Keywords: 5G, IoT, Web 3.0, Cybersecurity, Zero Trust Architecture, Surveillance Systems, Blockchain Technology

πŸ“… Publication Date: 06 October 2025

πŸ“œ License:

  • Share β€” Copy and Redistribute the material
  • Adapt β€” Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

The rapid expansion of fifth-generation (5G) networks and the Internet of Things (IoT) has permanently transformed global communication infrastructures by enabling massive connectivity, ultra-low latency, and real-time data exchange. While these advancements support smart cities, healthcare, industrial automation, and intelligent transportation systems, they simultaneously introduce complex cybersecurity and surveillance challenges. Existing security frameworks often lack the scalability, intelligence, and adaptability required to protect sensitive data and ensure system resilience within dynamic 5G–IoT ecosystems. Critical issues such as real-time threat detection, device-level security, and data integrity remain inadequately addressed. The findings highlight the importance of proactive security strategies and intelligent automation in developing secure next-generation 5G–IoT ecosystems. By bridging theoretical cybersecurity models with real-world applications, this research contributes to advancing resilient digital infrastructures and promoting a secure and trustworthy digital future.

Download Full PDF Paper


πŸ“– How to Cite

Ayushi Srivastava, Megha Agarwal Advanced Cybersecurity and Surveillance Frameworks for 5G–IoT Ecosystems: Integrating Web 3.0, Blockchain, and Zero Trust Architecture. TEJAS J. Technol. Humanit. Sci.,, Vol. 04, Issue 04. https://doi.org/10.63920/tjths.44008

πŸ“Š Article Metrics

πŸ‘οΈ Views: 12
πŸ“₯ Downloads: 8

References

[1]. Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley. https://doi.org/10.1002/9781119644682
[2]. Berners-Lee, T. (1989). Information management: A proposal (CERN DD-89-001). European Organization for Nuclear Research (CERN). https://cds.cern.ch/record/369245/files/dd-89001.pdf
[3]. Chappell, D. (2019). Cloud security handbook: Best practices for securing cloud applications and data. Wiley. https://doi.org/10.1002/9781119608789 [4]. Chauhan, K. (2024). Insider threat mitigation: Role of penetration testing. arXiv. https://doi.org/10.48550/arXiv.2407.17346
[5]. Chavhan, S., & Sharma, S. (2022). Shift to 6G: Exploration on trends, vision, requirements, and challenges.Journal of Network and Computer pplications, 202, 103407. https://doi.org/10.1016/j.jnca.2022.103407
[6]. Chen, J., Zhang, Y., & Ansari, N. (2021). 5G security: A survey of threats, challenges, and solutions. IEEE Communications Surveys & Tutorials, 23(1), 1–34. https://doi.org/10.1109/COMST.2021.3051234 [7]. Garbis, J., & Chapman, J. W. (2021). Zero trust security: An enterprise guide. Apress. https://doi.org/10.1007/978-1-4842-6702-8