Zero Trust-Based Mobile Network Security Architecture

被引:0
|
作者
Liu, Yiliang [1 ]
Su, Zhou [1 ]
Peng, Haixia [2 ]
Xiang, Yushan [3 ]
Wang, Wei [4 ]
Li, Ruidong [5 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian, Peoples R China
[3] Hainan Univ, Sch Cyberspace Secur, Haikou, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing, Peoples R China
[5] Kanazawa Univ, Inst Sci & Engn, Kanazawa, Ishikawa, Japan
基金
中国国家自然科学基金;
关键词
6G mobile communication; Access control; Atmospheric modeling; Semantics; Authentication; Communication channels; Network security; SCHEME;
D O I
10.1109/MWC.001.2300375
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement of air interface technology and the exponential growth of mobile services, mobile networks have become significantly complex. Traditional network security models, relying on regional defense strategies, are no longer sufficient to meet the current security demands. This article proposes the zero-trust architecture as a potential security mode for 6G. However, the distributed network architecture, the proliferation of connected devices, and the diverse service requirements of 6G pose sub-stantial challenges to this security model implementation. To address these issues, the article explores the opportunities presented by artificial intelligence (Al) and novel air interface technologies, which promote robust and efficient identity authentication, access control, and confidential data transmission for 6G. Finally, the article outlines a visionary outlook for the zero trust-based 6G security architecture, highlighting its potential impact on the future of mobile networks.
引用
收藏
页码:82 / 88
页数:7
相关论文
共 50 条
  • [1] A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
    Thulasiraman, Preetha
    Wang, Yizhong
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [2] A TRUST-BASED SECURITY ARCHITECTURE FOR TACTICAL MANETS
    Lacharite, Yannick
    Nguyen, Dang Quan
    Wang, Maoyu
    Lamont, Louise
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1227 - 1233
  • [3] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [4] A Segregated Architecture for a Trust-based Network of Internet of Things
    Ferraris, Davide
    Fernandez-Gago, Carmen
    Daniel, Joshua
    Lopez, Javier
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [5] Trust-based security routing mechanism in mobile social networks
    Shuang Yang
    Xingwei Wang
    Shuang Zhang
    Bo Yi
    Min Huang
    [J]. Neural Computing and Applications, 2020, 32 : 5609 - 5620
  • [6] Trust-based security routing mechanism in mobile social networks
    Yang, Shuang
    Wang, Xingwei
    Zhang, Shuang
    Yi, Bo
    Huang, Min
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10): : 5609 - 5620
  • [7] Trust-Based Security; Or, Trust Considered Harmful
    Singer, Abe
    Bishop, Matt
    [J]. NEW SECURITY PARADIGMS WORKSHOP (NSPW 2020), 2020, : 76 - 89
  • [8] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032
  • [9] Zero Trust Security in the Mist Architecture
    Uehara, Minoru
    [J]. COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021, 2021, 278 : 185 - 194
  • [10] Research on Telecommuting Security Solution Based on Zero Trust Architecture
    Kou, Wanli
    Zhou, Huaizhe
    Du, Jia
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 82 - 89