Table 1.
A comparative analysis of proposed work with the existing studies.
| Author | Year | Objective | 6G | Security | Approach | Pros | Cons |
|---|---|---|---|---|---|---|---|
| Xu et al. [33] | 2019 | Smart public safety system. | ✗ | Blockchain. | BlendMAS. | The scheme offers secure and smart data sharing with access control. | Does not yet explore 6G networks. |
| Ihinosen et al. [32] | 2020 | Safety and security in rideshare service. | ✗ | Using facial recognition API. | GPS tracking and 2-way rating system. | Developed mobile ridesharing scheme enhance the security | Did not consider latency and delay. |
| Fitwi et al. [34] | 2020 | Video surveillance systems security. | ✗ | Blockchain. | Lib-Pri scheme. | The scheme offers real-time video analytics by identifying fugitives using facial features. | Did not consider data confidentiality and scalability. |
| Makhdoom et al. [35] | 2021 | To prevent cyberattack incidents. | ✗ | Blockchain. | Blockchain-enabled collaborative intrusion detection systems. | The scheme enabled node and application authorization. | Does not discuss the scalability of the system. |
| Wu et al. [36] | 2022 | On-site safety for tower cranes. | ✗ | Blockchain. | Smart contract, consensus, and Hyperledger-Fabric-based framework. | The scheme enhanced the safety performance. | Did not consider latency, throughput, and computation overhead analysis. |
| Yu et al. [37] | 2022 | Security and privacy of IIoT data. | ✗ | Blockchain and cryptography. | STCChain. | The scheme prevented data stealing and attacks. | Does not incorporate 6G-based solution. |
| Na et al. [38] | 2022 | Crime and accident prevention for autonomous vehicles. | ✗ | Blockchain. | Multisignature-enabled access control using GPS data. | The scheme offers privacy and security of the image and video data with lower latency. | The scheme limits verifying the reliability of GPS data. |
| Proposed scheme | 2022 | Public safety to monitor criminal activity. | ✓ | Blockchain. | Layered architecture incorporating blockchain and 6G to detect crime. | The scheme uses different ML classifier to identify the attack and nonattack from the criminal activity dataset. | - |