A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks

被引:0
|
作者
Nahar, Nurun [1 ]
Andersson, Karl [1 ]
Schelen, Olov [1 ]
Saguna, Saguna [1 ]
机构
[1] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-93187 Skelleftea, Sweden
来源
IEEE ACCESS | 2024年 / 12卷
关键词
6G mobile communication; Security; Authentication; Zero Trust; Surveys; Computer architecture; Network security; Trusted computing; Zero-trust architecture; 6G networks; multi-factor authentication; perimeter-based security; SECURITY; TECHNOLOGIES; PRIVACY;
D O I
10.1109/ACCESS.2024.3425350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks include a broader array of devices and sensors compared to earlier generations, increasing the potential for attackers to exploit weaknesses. Existing security frameworks contribute to safeguarding enterprises against external threats that originate beyond the network perimeter. These frameworks operate under the assumption that all entities inside the defined perimeters are reliable, and their primary objective is to authorize access to resources based on assigned roles and permissions. However, this strategy could be more effective today since attacks might originate from any source, including within the network perimeter. To address this issue, a zero-trust architecture (ZTA) could be a potential solution that assumes neither users nor devices can be inherently trusted, and it consistently evaluates potential risks to decide whether to allow access to resources. This article will explore the zero-trust approach and its significance in contemporary network security. We describe the role of authentication and access control in ZTA and present an in-depth discussion of state-of-the-art authentication and access control techniques in different scenarios. This article examines the applicability of the zero-trust concept in 6G networks and analyzes the associated challenges and opportunities. This article also examines case studies demonstrating the practical application of the zero trust paradigm in 6G or comparable networks. It explores the research scope and tries to identify relevant research gaps in this area.
引用
收藏
页码:94753 / 94764
页数:12
相关论文
共 50 条
  • [21] Security and Trust in Open and Disaggregated 6G networks
    Alemany, P.
    Munoz, R.
    Vilalta, R.
    Gifre, Ll
    Martinez, R.
    Casellas, R.
    Castro, M.
    Ferreira, P.
    Moreira, D.
    Garcia, J.
    Cunha, J.
    Nunez, I
    Gomez, G.
    Castro, S.
    Pastor, A.
    Lopez, D.
    2024 24TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, ICTON 2024, 2024,
  • [22] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Hichem Sedjelmaci
    Nesrine Kaaniche
    Kamel Tourki
    Journal of Network and Systems Management, 2024, 32
  • [23] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Sedjelmaci, Hichem
    Kaaniche, Nesrine
    Tourki, Kamel
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)
  • [24] 6G Massive Radio Access Networks: Key Applications, Requirements and Challenges
    Lee Y.L.
    Qin D.
    Wang L.-C.
    Sim G.H.
    IEEE Open Journal of Vehicular Technology, 2021, 2 : 54 - 66
  • [25] Reconfigurable Intelligent Surfaces: Potentials, Applications, and Challenges for 6G Wireless Networks
    Basharat, Sarah
    Hassan, Syed Ali
    Pervaiz, Haris
    Mahmood, Aamir
    Ding, Zhiguo
    Gidlund, Mikael
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (06) : 184 - 191
  • [26] Zero Touch Management: A Survey of Network Automation Solutions for 5G and 6G Networks
    Coronado, Estefania
    Behravesh, Rasoul
    Subramanya, Tejas
    Fernandez-Fernandez, Adriana
    Siddiqui, Muhammad Shuaib
    Costa-Perez, Xavier
    Riggio, Roberto
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (04): : 2535 - 2578
  • [27] A Survey on Green 6G Network: Architecture and Technologies
    Huang, Tongyi
    Yang, Wu
    Wu, Jun
    Ma, Jin
    Zhang, Xiaofei
    Zhang, Daoyin
    IEEE ACCESS, 2019, 7 : 175758 - 175768
  • [28] The Road to Trustworthy 6G: A Survey on Trust Anchor Technologies
    Veith, Benedikt
    Krummacker, Dennis
    Schotten, Hans D.
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 : 581 - 595
  • [29] Zero-Energy Devices Empowered 6G Networks: Opportunities, Key Technologies, and Challenges
    Naser S.
    Bariah L.
    Muhaidat S.
    Basar E.
    IEEE Internet of Things Magazine, 2023, 6 (03): : 44 - 50
  • [30] ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks
    Khowaja, Sunder Ali
    Khuwaja, Parus
    Dev, Kapal
    Singh, Keshav
    Nkenyereye, Lewis
    Kilper, Dan
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,