Softwarized Resource Allocation of Tailored Services with Zero Security Trust in 6G Networks

被引:1
|
作者
Cao, Haotong [1 ,2 ]
Yang, Longxiang [1 ,2 ]
Garg, Sahil [3 ]
Alrashoud, Mubarak [4 ]
Guizani, Mohsen [5 ]
机构
[1] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Wireless Commun, Nanjing, Peoples R China
[2] NJUPT, Jiangsu Engn Res Ctr Commun & Network Technol, Nanjing, Peoples R China
[3] Ecole Technol Super, Montreal, PQ, Canada
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh, Saudi Arabia
[5] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Machine Learning, Abu Dhabi, U Arab Emirates
基金
中国国家自然科学基金;
关键词
6G mobile communication; Hardware; Software; Security; Resource management; Computer security;
D O I
10.1109/MWC.001.2300383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Comparing with previous five generation networks consisting of dedicated appliance, 6G network appliances are designed to be softwarized and isolated into software (resource and function) blocks and general-purpose hardware. Tailored services, having customized resources and function demands, can be executed by chained software blocks and co-exist in the underlying 6G general-purpose hardware. However, physical hardware is vulnerable to a wide range of security threats and attacks. When attacked, this can result in devastation and failure of tailored services. Furthermore, the quality of a tailored service will be greatly degraded. Recently, zero security trust emerges and is accepted as one contemporary security model that provides a new cybersecurity strategy to eliminate implicit trust. Thus, the soft-warized resource allocation of tailored services with zero security trust is investigated in this article. 6G networks and tailored service are firstly modeled and described. Then, the softwarized resource allocation method, abbreviated as Tail-ZeSec-6G, is detailed. When receiving one tailored service request, Tail-ZeSec-6G will check all underlying general-purpose appliance and eliminate implicit trust issues. After undergoing the security check and evaluation, Tail-ZeSec-6G will conduct a tailored resource allocation. Secure appliances with abundant softwarized resources will be selected to deploy the tailored service request, by adopting the resource allocation strategy in Tail-ZeSec-6G. When processing the tailored resource allocation, the Tail-ZeSec-6G method verifies the security of each appliance. Thus, Tail-ZeSec-6G method guarantees the deployment success and security performance. To validate the feasibility and merits of Tail-ZeSec-6G, evaluation is conducted. Finally, we conclude this article emphasizing three dominant directions.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [1] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    [J]. IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [2] Toward Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization
    Cao, Haotong
    Du, Jianbo
    Zhao, Haitao
    Luo, Daniel Xiapu
    Kumar, Neeraj
    Yang, Longxiang
    Yu, F. Richard
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09): : 6623 - 6637
  • [3] A softwarized resource allocation framework for security and location guaranteed services in B5G networks
    Wu, Shengchen
    Cao, Haotong
    Zhao, Haitao
    Hu, Yue
    Yang, Longxiang
    Yin, Hao
    Zhu, Hongbo
    [J]. COMPUTER COMMUNICATIONS, 2021, 178 : 26 - 36
  • [4] Resource Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks
    Cao, Haotong
    Wang, Xiaoming
    Jiang, Rui
    Liu, Ting
    Xue, Lei
    Luo, Daniel Xiapu
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING, WCSP, 2022, : 610 - 614
  • [5] Advancing Security for 6G Smart Networks and Services
    Liyanage, Madhusanka
    Porambage, Pawani
    Zeydan, Engin
    Senavirathne, Thulitha
    Siriwardhana, Yushan
    Yadav, Awaneesh Kumar
    Siniarski, Bartlomiej
    [J]. 2024 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT 2024, 2024, : 1169 - 1174
  • [6] Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks
    Cao, Haotong
    Kumar, Neeraj
    Yang, Longxiang
    Guizani, Mohsen
    Yu, F. Richard
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (01): : 1032 - 1047
  • [7] TRUST, SECURITY AND PRIVACY OF 6G
    Yan, Zheng
    Yang, Laurence T.
    Li, Tieyan
    Miche, Yoan
    Yu, Shui
    Yau, Stephen S.
    [J]. IEEE NETWORK, 2022, 36 (04): : 100 - 102
  • [8] Security and Trust in the 6G Era
    Ziegler, Volker
    Schneider, Peter
    Viswanathan, Harish
    Montag, Michael
    Kanugovi, Satish
    Rezaki, Ali
    [J]. IEEE ACCESS, 2021, 9 (09): : 142314 - 142327
  • [9] A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks
    Nahar, Nurun
    Andersson, Karl
    Schelen, Olov
    Saguna, Saguna
    [J]. IEEE ACCESS, 2024, 12 : 94753 - 94764
  • [10] Enabling 6G Security: The Synergy of Zero Trust Architecture and Artificial Intelligence
    Sedjelmaci, Hichem
    Tourki, Kamel
    Ansari, Nirwan
    [J]. IEEE NETWORK, 2024, 38 (03): : 171 - 177