Intelligent Zero Trust Architecture for 5G/6G Tactical Networks: Principles, Challenges, and the Role of Machine Learning

05/04/2021
by   Keyvan Ramezanpour, et al.
0

In this position paper, we discuss the critical need for integrating zero trust (ZT) principles into next-generation communication networks (5G/6G) for both tactical and commercial applications. We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components. While network virtualization, software-defined networking (SDN), and service-based architectures (SBA) are key enablers of 5G networks, operating in an untrusted environment has also become a key feature of the networks. Further, seamless connectivity to a high volume of devices in multi-radio access technology (RAT) has broadened the attack surface on information infrastructure. Network assurance in a dynamic untrusted environment calls for revolutionary architectures beyond existing static security frameworks. This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks. We introduce key ZT principles as real-time Monitoring of the security state of network assets, Evaluating the risk of individual access requests, and Deciding on access authorization using a dynamic trust algorithm, called MED components. The envisioned architecture adopts an SBA-based design, similar to the 3GPP specification of 5G networks, by leveraging the open radio access network (O-RAN) architecture with appropriate real-time engines and network interfaces for collecting necessary machine learning data. The i-ZTA is also expected to exploit the multi-access edge computing (MEC) technology of 5G as a key enabler of intelligent MED components for resource-constraint devices.

READ FULL TEXT

page 1

page 3

page 4

research
02/02/2022

Understanding O-RAN: Architecture, Interfaces, Algorithms, Security, and Research Challenges

Open Radio Access Network (RAN) and its embodiment through the O-RAN All...
research
03/15/2022

Zero Trust Architecture for 6G Security

The upcoming sixth generation (6G) network is envisioned to be more open...
research
12/21/2019

Guidelines for 5G End to End Architecture and Security Issues

Hackers target their attacks on the most vulnerable parts of a system. A...
research
01/31/2022

Architectures for Protecting Cloud Data Planes

This paper explores three approaches for protecting cloud application da...
research
06/08/2020

Softwarization, Virtualization, Machine Learning For Intelligent Effective V2X Communications

The concept of the fifth generation (5G) mobile network system has emerg...
research
04/18/2018

Volur: Concurrent Edge/Core Route Control in Data Center Networks

A perennial question in computer networks is where to place functionalit...

Please sign up or login with your details

Forgot password? Click here to reset