A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks

被引:0
|
作者
Nahar, Nurun [1 ]
Andersson, Karl [1 ]
Schelen, Olov [1 ]
Saguna, Saguna [1 ]
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-93187 Skelleftea, Sweden
来源
IEEE ACCESS | 2024年 / 12卷
关键词
6G mobile communication; Security; Authentication; Zero Trust; Surveys; Computer architecture; Network security; Trusted computing; Zero-trust architecture; 6G networks; multi-factor authentication; perimeter-based security; SECURITY; TECHNOLOGIES; PRIVACY;
D O I
10.1109/ACCESS.2024.3425350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks include a broader array of devices and sensors compared to earlier generations, increasing the potential for attackers to exploit weaknesses. Existing security frameworks contribute to safeguarding enterprises against external threats that originate beyond the network perimeter. These frameworks operate under the assumption that all entities inside the defined perimeters are reliable, and their primary objective is to authorize access to resources based on assigned roles and permissions. However, this strategy could be more effective today since attacks might originate from any source, including within the network perimeter. To address this issue, a zero-trust architecture (ZTA) could be a potential solution that assumes neither users nor devices can be inherently trusted, and it consistently evaluates potential risks to decide whether to allow access to resources. This article will explore the zero-trust approach and its significance in contemporary network security. We describe the role of authentication and access control in ZTA and present an in-depth discussion of state-of-the-art authentication and access control techniques in different scenarios. This article examines the applicability of the zero-trust concept in 6G networks and analyzes the associated challenges and opportunities. This article also examines case studies demonstrating the practical application of the zero trust paradigm in 6G or comparable networks. It explores the research scope and tries to identify relevant research gaps in this area.
引用
收藏
页码:94753 / 94764
页数:12
相关论文
共 50 条
  • [1] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [2] A Learning-Based Zero-Trust Architecture for 6G and Future Networks
    Enright, Michael A.
    Hammad, Eman
    Dutta, Ashutosh
    2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022, : 64 - 71
  • [3] Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN)
    Moudoud, Hajar
    Houda, Zakaria Abou El
    Brik, Bouziane
    IEEE Networking Letters, 2024, 6 (04): : 272 - 275
  • [4] Innovative Trends in the 6G Era: A Comprehensive Survey of Architecture, Applications, Technologies, and Challenges
    Quy, Vu Khanh
    Chehri, Abdellah
    Quy, Nguyen Minh
    Han, Nguyen Dinh
    Ban, Nguyen Tien
    IEEE ACCESS, 2023, 11 : 39824 - 39844
  • [5] Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN
    Ramezanpour, Keyvan
    Jagannath, Jithin
    COMPUTER NETWORKS, 2022, 217
  • [6] Enabling 6G Security: The Synergy of Zero Trust Architecture and Artificial Intelligence
    Sedjelmaci, Hichem
    Tourki, Kamel
    Ansari, Nirwan
    IEEE NETWORK, 2024, 38 (03): : 171 - 177
  • [7] Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities
    Parra-Ullauri, Juan Marcelo
    Zhang, Xunzheng
    Bravalheri, Anderson
    Moazzeni, Shadi
    Wu, Yulei
    Nejabati, Reza
    Simeonidou, Dimitra
    IEEE NETWORK, 2024, 38 (02): : 9 - 17
  • [8] COMMUNICATIONS AND NETWORKS RESOURCES SHARING IN 6G: CHALLENGES, ARCHITECTURE, AND OPPORTUNITIES
    Yan, Kun
    Ma, Wenping
    Sun, Shaohui
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (06) : 102 - 109
  • [9] A Survey on Zero Trust Architecture: Challenges and Future Trends
    He, Yuanhang
    Huang, Daochao
    Chen, Lei
    Ni, Yi
    Ma, Xiangjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] 6G: A comprehensive survey on technologies, applications, challenges, and research problems
    Mahmoud, Haitham Hassan H.
    Amer, Amira A.
    Ismail, Tawfik
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (04)