Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture

被引:0
|
作者
Hichem Sedjelmaci
Nesrine Kaaniche
Kamel Tourki
机构
[1] Ericsson R&D Security,Samovar, Télécom SudParis
[2] Institut Polytechnique de Paris,undefined
[3] Ericsson S&T France,undefined
关键词
6G; RAN; Zero trust; Secure; Resilient;
D O I
暂无
中图分类号
学科分类号
摘要
The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.
引用
下载
收藏
相关论文
共 50 条
  • [31] XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G
    Porambage, Pawani
    Pinola, Jarno
    Rumesh, Yasintha
    Tao, Chen
    Huusko, Jyrki
    2023 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT, 2023, : 699 - 704
  • [32] Orchestration of RAN and Transport Networks for 5G: An SDN Approach
    Rostami, Ahmad
    Ohlen, Peter
    Wang, Kun
    Ghebretensae, Zere
    Skubic, Bjorn
    Santos, Mateus
    Vidal, Allan
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (04) : 64 - 70
  • [33] Resilient BBU placement in 5G C-RAN over optical aggregation networks
    Shehata, Mohamed
    Musumeci, Francesco
    Tornatore, Massimo
    PHOTONIC NETWORK COMMUNICATIONS, 2019, 37 (03) : 388 - 398
  • [34] ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks
    Khowaja, Sunder Ali
    Khuwaja, Parus
    Dev, Kapal
    Singh, Keshav
    Nkenyereye, Lewis
    Kilper, Dan
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [35] Resilient BBU placement in 5G C-RAN over optical aggregation networks
    Mohamed Shehata
    Francesco Musumeci
    Massimo Tornatore
    Photonic Network Communications, 2019, 37 : 388 - 398
  • [36] Decentralized Approach for Jamming Illegal Access and Secure Data Recovery in Military Networks
    Khodke, Roshani
    Dhawas, V. N.
    2016 CONFERENCE ON ADVANCES IN SIGNAL PROCESSING (CASP), 2016, : 344 - 349
  • [37] Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach
    Taleghani, Elmira Saeedi
    Valencia, Ronald Ivan Maldonado
    Orozco, Ana Lucila Sandoval
    Villalba, Luis Javier Garcia
    ELECTRONICS, 2024, 13 (15)
  • [38] Decentralized Trust in Distributed Networks: a Delegate-based Security Hardening Approach
    Gu, Jabeom
    Nah, Jaehoon
    Jang, Jongsoo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 265 - 272
  • [39] Edge Intelligence-Based RAN Architecture for 6G Internet of Things
    Liu, Yang
    Wang, Qingtian
    Liu, Haitao
    Zong, Jiaying
    Yang, Fengyi
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2022, 2022
  • [40] Securing 5G Cloud Native NFV architecture with Zero Trust Security
    Sajid, Taha
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,