Zero Trust Architecture for 6G Security

03/15/2022
by   Xu Chen, et al.
0

The upcoming sixth generation (6G) network is envisioned to be more open and heterogeneous than earlier generations. This challenges conventional security architectures, which typically rely on the construction of a security perimeter at network boundaries. In this article, we propose a software-defined zero trust architecture (ZTA) for 6G networks, which is promising for establishing an elastic and scalable security regime. This architecture achieves secure access control through adaptive collaborations among the involved control domains, and can effectively prevent malicious access behaviors such as distributed denial of service (DDoS) attacks, malware spread, and zero-day exploits. We also introduce key design aspects of this architecture and show the simulation results of a case study, which shows the effectiveness and robustness of ZTA for 6G. Furthermore, we discuss open issues to further promote this new architecture.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/04/2021

Intelligent Zero Trust Architecture for 5G/6G Tactical Networks: Principles, Challenges, and the Role of Machine Learning

In this position paper, we discuss the critical need for integrating zer...
research
07/19/2021

Zero Trust Service Function Chaining

In this paper, we address the inefficient handling of traditional securi...
research
01/31/2022

Architectures for Protecting Cloud Data Planes

This paper explores three approaches for protecting cloud application da...
research
04/26/2022

Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?

The Open RAN architecture is a promising and future-oriented architectur...
research
10/20/2022

Trust-as-a-Service: A reputation-enabled trust framework for 5G networks

Trust, security, and privacy are three of the major pillars to assemble ...
research
07/20/2021

Secure Access Control for DAG-based Distributed Ledgers

Access control is a fundamental component of the design of distributed l...

Please sign up or login with your details

Forgot password? Click here to reset