An Interoperable Zero Trust Federated Architecture for Tactical Systems

被引:0
|
作者
Poirrier, Alexandre [1 ,2 ]
Cailleux, Laurent [2 ]
Clausen, Thomas Heide [1 ]
机构
[1] Ecole Polytech, Palaiseau, France
[2] Direct Gen Armement, Palaiseau, France
关键词
Federation; Internet of Military Things; Software-Defined Perimeters; Zero Trust; ATTESTATION;
D O I
10.1109/MILCOM58377.2023.10356247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In military and tactical missions, operational needs can require different domains and nations in a coalition to federate, to facilitate sharing of resource between domains. On the other hand, data and services need to be protected against unauthorized access. The zero trust paradigm provides principles for securing data and services, based on fine-grain compartmentalization of resources and least-privileged access policies. In zero trust architectures, every access to a resource is verified, without relying on implicit trust between the requester and the resource. However, state-of-the-art federation procedures weaken the zero trust security guarantees, as information on requesters, belonging to one domain, cannot be verified by another domain offering a resource. Therefore, access inherently relies on trust between domains, which contradicts zero trust principles. This paper presents a novel technique to create a zero trust federation, in which every access to a resource is explicitly verified, without trusting federation partners. In particular, due to the power constraints on devices composing tactical architectures, the presented solution does not require invasive software to be installed in requester devices.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Federated Zero Trust Architecture using Artificial Intelligence
    Hussain, Mukhtar
    Pal, Shantanu
    Jadidi, Zahra
    Foo, Ernest
    Kanhere, Salil
    [J]. IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 30 - 35
  • [2] A zero trust architecture for health information systems
    Onome Christopher Edo
    David Ang
    Praveen Billakota
    Johnny C. Ho
    [J]. Health and Technology, 2024, 14 : 189 - 199
  • [3] A zero trust architecture for health information systems
    Edo, Onome Christopher
    Ang, David
    Billakota, Praveen
    Ho, Johnny C.
    [J]. HEALTH AND TECHNOLOGY, 2024, 14 (01) : 189 - 199
  • [4] Building a high-level architecture federated interoperable framework from legacy information systems
    Tu, Zhiying
    Zacharewicz, Gregory
    Chen, David
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2014, 27 (04) : 313 - 332
  • [5] Zero Trust Architecture Patterns for Cyber-Physical Systems
    Hasan S.
    Amundson I.
    Hardin D.
    [J]. SAE International Journal of Advances and Current Practices in Mobility, 2023, 5 (05): : 1919 - 1931
  • [6] The Inhibitors to Zero Trust Architecture
    Ross, Steven J.
    [J]. ISACA Journal, 2024, 3 : 3 - 5
  • [7] Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework
    Pokhrel, Shiva Raj
    Yang, Luxing
    Rajasegarar, Sutharshan
    Li, Gang
    [J]. PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 7 - 12
  • [8] Optimization Design of Zero Trust Network Architecture for New Power Systems
    Bin, Dongmei
    Ming, Shaofeng
    Yang, Chunyan
    Fu, Hua
    Ling, Ying
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 282 - 286
  • [9] Zero Trust Architecture Approach for Developing Mission Critical Embedded Systems
    Vai, Michael
    Whelihan, David
    Simpson, Eric
    Kava, Donato
    Lee, Alice
    Nguyen, Huy
    Hughes, Jeffrey
    Torres, Gabriel
    Lim, Jeffery
    Nahill, Ben
    Khazan, Roger
    Schneider, Fred
    [J]. 2023 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE, HPEC, 2023,
  • [10] A TRUST-BASED SECURITY ARCHITECTURE FOR TACTICAL MANETS
    Lacharite, Yannick
    Nguyen, Dang Quan
    Wang, Maoyu
    Lamont, Louise
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1227 - 1233