Tutorial 12: How to secure the future intelligent communication networks. The role of blockchain-based systems, Web3 and GenAI

Speakers

 

Abstract

Future Internet cybersecurity and associated services for end users might be completely transformed by the Web3 paradigm. Smart contracts, tokens, and blockchain are the foundation of this paradigm shift. The influence also extends to the upcoming underlying communication networks, such as Advanced 5G and 6G. According to the most significant security authorities (such as NIST, ENISA, etc.), the keynote address will outline the essential Web3 characteristics and their implications for the security of the next platforms, data, and communication networks BY5G and 6G. The Zero-Trust Architecture (ZTA)-based approach is also described. Along with its privacy and security problems, the enabling applications—such as Decentralised Autonomous Organisations (DAO), Non-Fungible Tokens (NFT), and Decentralised Apps (dAPP)—will also be examined.

The security issues managed by Web3-based technologies are also evidenced, together with their integration with goal-oriented semantic network approaches and AI/ML techniques. In particular, the emergence of Generative AI (GenAI) introduces new opportunities and challenges for cybersecurity and trust management in Web3 ecosystems. GenAI models can enhance smart contract auditing, detect anomalous behaviors, and automatically generate secure code or synthetic threat scenarios, while also posing novel attack surfaces such as deepfake-based social engineering and AI-generated malware. The synergy between Web3 and GenAI thus represents a key research frontier for adaptive, intelligent, and trustworthy digital ecosystems. Finally, the Web3 open topics and challenges will be the subject of conclusions. Web3-based DAPPs and examples are described through live demos and exercises.

Objectives and motivation

The innovative features of web3 are of interest to the next communication networks (BY5G/6G) to be introduced by 2030. The novelty of the topic also embraces final vertical applications in different industrial fields, addressing security issues.

The tutorial will:

  • Give an overview and technical description of the web3 technologies based on blockchains and the evolution of Web3 solutions.
  • Present the impact of Web3 on BY5G/6G communication networks to secure the communications
  • Present the role of AI/ML within the Web3 framework for security applications
  • Describe most relevant vertical applications of Web3 and corresponding security issues
  • Describe some Web3-based DAPPs and examples based on Linux S.O.
  • Perform live demos and exercises

 

Target Audience

Managers from the industry, researchers and professors, consultants and professionals, vendors, scientists, security experts.

This tutorial is designed for researchers, professionals, and advanced students interested in the convergence of Web3 technologies, cybersecurity, and AI/ML-driven automation, particularly within the context of advanced 5G and 6G networks. Participants are expected to have a solid understanding of fundamental networking and cybersecurity principles, including cryptographic concepts, authentication mechanisms, and Zero-Trust Architectures (ZTA).

Familiarity with blockchain concepts—such as smart contracts, tokens, and decentralized applications (dAPPs)—is recommended, as these will form the foundation of several hands-on examples and demonstrations. Basic programming skills (in Python or JavaScript) and an understanding of machine learning workflows will enable attendees to better follow the integration of AI/ML and Generative AI (GenAI) techniques within Web3 ecosystems.

Some exposure to AI-based security applications, such as anomaly detection or adversarial analysis, will be beneficial but not mandatory. Participants should be comfortable navigating topics at the intersection of distributed systems, data privacy, and intelligent automation.

 

Outline and Description of the Tutorial

A description of the topics that the tutorial will address, emphasizing their timelines.

  1. The main features of web3 in terms (smart contract, Dapp, DAO) (20 m)
  2. Impact on next communication networks (BY5G/6G) (25 m)
  3. Goal-oriented semantic approach and AI/ML techniques (25 m)
  4. Applicability to vertical applications (i.e. automotive, energy,..) (30 m)
  5. Privacy and security (30 m)
  6. Open topics and challenges (30 m)
  7. Live demos and examples (15 m)
  8. Q&A (5 m)

An outline of the tutorial content, including its tentative schedule and the presenters for different parts.

  • Introduction to Web3 and main features
  • Impact on next communication networks (BY5G/6G)
  • Web3 for securing advanced communication networks
  • Goal-oriented semantic approach and AI/ML techniques for web3
  • Web3 for vertical applications. Some examples.
  • Privacy and security issues
  • Open topics and challenges
  • Live demos of some dAPPs

 

Reading List

  1. Y. Zuo, J. Guo, N. Gao, Y. Zhu, S. Jin, e X. Li, “A survey of blockchain and artificial intelligence for 6G wireless communications,” IEEE Communications Surveys & Tutorials, 2023.
  2. L. Cao, “Decentralized AI: Edge Intelligence and Smart Blockchain, Metaverse, Web3, and DeSci,” IEEE Intelligent Systems, vol. 37, no. 6, pp. 10–21, 2022.
  3. “Generative-AI (with Custom-Trained Meta’s Llama2 LLM), Blockchain, NFT, Federated Learning and PBOM Enabled Data Security Architecture for Metaverse on 5G/6G Environment,” IEEE Conference Paper, 2025.
  4. Alma Mater Studiorum — Università di Bologna, “Security and Trust in the 6G Era: Risks and Mitigations,” Electronics, vol. 13, no. 11, 2024.
  5. M. Wang, et al., “Security and privacy in 6G networks: New areas and new challenges,” Digital Communications and Networks, Elsevier, 2020.
  6. M.-C. Valiente and J. Pavón, “Web3‐DAO: An ontology for decentralized autonomous organizations,” Journal of Web Semantics, vol. 84, 2024, Art. no. 100842.
  7. D. Yaga and P. Mell, A Security Perspective on the Web3 Paradigm, NIST IR 8475, National Institute of Standards and Technology, 2025.
  8. J. Huang, L. Kong, G. Cheng, Q. Xiang, G. Chen, G. Huang, and X. Liu, “Advancing Web 3.0: Making Smart Contracts Smarter on Blockchain,” in Proc. 33rd Int. World Wide Web Conf. (WWW ’24), 2024, pp. 1025–1036.
  9. J. J. Si, T. S. Sharma, and K. Y. Wang, “Understanding User‐Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem,” IACR ePrint Archive, Report 2024/271, 2024.
  10. Exploring Smart Contracts based on Web 3.0 Applications with respect to Vulnerability Detection Mechanisms, IEEE, 2024.

 

Vertical

Cutting-edge AI Research

 

Timeline

4 hours