Softwarized Resource Allocation of Tailored Services with Zero Security Trust in 6G Networks

被引:1
|
作者
Cao, Haotong [1 ,2 ]
Yang, Longxiang [1 ,2 ]
Garg, Sahil [3 ]
Alrashoud, Mubarak [4 ]
Guizani, Mohsen [5 ]
机构
[1] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Wireless Commun, Nanjing, Peoples R China
[2] NJUPT, Jiangsu Engn Res Ctr Commun & Network Technol, Nanjing, Peoples R China
[3] Ecole Technol Super, Montreal, PQ, Canada
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh, Saudi Arabia
[5] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Machine Learning, Abu Dhabi, U Arab Emirates
基金
中国国家自然科学基金;
关键词
6G mobile communication; Hardware; Software; Security; Resource management; Computer security;
D O I
10.1109/MWC.001.2300383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Comparing with previous five generation networks consisting of dedicated appliance, 6G network appliances are designed to be softwarized and isolated into software (resource and function) blocks and general-purpose hardware. Tailored services, having customized resources and function demands, can be executed by chained software blocks and co-exist in the underlying 6G general-purpose hardware. However, physical hardware is vulnerable to a wide range of security threats and attacks. When attacked, this can result in devastation and failure of tailored services. Furthermore, the quality of a tailored service will be greatly degraded. Recently, zero security trust emerges and is accepted as one contemporary security model that provides a new cybersecurity strategy to eliminate implicit trust. Thus, the soft-warized resource allocation of tailored services with zero security trust is investigated in this article. 6G networks and tailored service are firstly modeled and described. Then, the softwarized resource allocation method, abbreviated as Tail-ZeSec-6G, is detailed. When receiving one tailored service request, Tail-ZeSec-6G will check all underlying general-purpose appliance and eliminate implicit trust issues. After undergoing the security check and evaluation, Tail-ZeSec-6G will conduct a tailored resource allocation. Secure appliances with abundant softwarized resources will be selected to deploy the tailored service request, by adopting the resource allocation strategy in Tail-ZeSec-6G. When processing the tailored resource allocation, the Tail-ZeSec-6G method verifies the security of each appliance. Thus, Tail-ZeSec-6G method guarantees the deployment success and security performance. To validate the feasibility and merits of Tail-ZeSec-6G, evaluation is conducted. Finally, we conclude this article emphasizing three dominant directions.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [41] THE EUROPEAN VISION FOR 6G SMART NETWORKS AND SERVICES
    Mohr, Werner
    Kaloxylos, Alexandros
    Trichias, Konstantinos
    Willcock, Colin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (04) : 10 - 12
  • [42] Joint Resource and Power Allocation for URLLC-eMBB Traffics Multiplexing in 6G Wireless Networks
    Almekhlafi, Mohammed
    Arfaoui, Mohamed Amine
    Assi, Chadi
    Ghrayeb, Ali
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [43] Optimal Resource Allocation for NOMA-Assisted Backscatter Communication in 6G Internet of Vehicles Networks
    Tuong, Van Dat
    Kim, Dongwan
    Kim, Eui-Jik
    Paek, Jeongyeup
    Cho, Sungrae
    [J]. 38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 290 - 294
  • [44] Energy-Efficient Resource Allocation for 6G Backscatter-Enabled NOMA IoV Networks
    Khan, Wali Ullah
    Javed, Muhammad Awais
    Nguyen, Tu N.
    Khan, Shafiullah
    Elhalawany, Basem M.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 9775 - 9785
  • [45] Seamless and Intelligent Resource Allocation in 6G Maritime Networks Framework via Deep Reinforcement Learning
    Hassan, Sheikh Salman
    Park, Seong-Bae
    Huh, Eui-Nam
    Hong, Choong Seon
    [J]. 2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 505 - 510
  • [46] On-Demand Incentive Design for Security-Defense Resource Allocation in 6G Vehicular Edge Learning
    Li, Hongyang
    Lin, Xi
    Wu, Jun
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1421 - 1426
  • [47] Resource Mapping Allocation Scheme in 6G Satellite Twin Network
    Deng, Zhongliang
    Yu, Xiaoyi
    [J]. SENSORS, 2022, 22 (15)
  • [48] Optimum Resource Allocation in 6G Optical Wireless Communication Systems
    Alsulami, Osama Zwaid
    Alahmadi, Amal A.
    Saeed, Sarah O. M.
    Mohamed, Sanaa Hamid
    El-Gorashi, T. E. H.
    Alresheedi, Mohammed T.
    Elmirghani, Jaafar M. H.
    [J]. 2020 2ND 6G WIRELESS SUMMIT (6G SUMMIT), 2020,
  • [49] Efficient resource allocation for 5G/6G cognitive radio networks using probabilistic interference models
    Zaheer, Osama
    Ali, Mudassar
    Imran, Muhammad
    Zubair, Humayun
    Naeem, Muhammad
    [J]. PHYSICAL COMMUNICATION, 2024, 64
  • [50] Efficient Resource Allocation of Slicing Services in Softwarized Space-Aerial-Ground Integrated Networks for Seamless and Open Access Services
    Cao, Haotong
    Garg, Sahil
    Kaddoum, Georges
    Alrashoud, Mubarak
    Yang, Longxiang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9284 - 9295