A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

被引:0
|
作者
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Lee, Sangwoo [2 ]
Kwon, Hyeokchan [2 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
6G mobile communication; Authentication; Security; Access control; Internet of Things; Blockchains; Protocols; 5G mobile communication; Drones; Base stations; Encryption; Zero Trust; attribute-based encryption; authentication; blockchain; key agreement; sixth generation (6G); zero-trust; MANAGEMENT; BLOCKCHAIN; PROTOCOL; SECURITY; INTERNET; DESIGN;
D O I
10.1109/ACCESS.2024.3484522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sixth generation (6G) is the next generation of wireless communication technology, is not limited to cellular networks but can be used to provide better services in all areas of wireless communication, including vehicles, drones, and smart homes. However, these advancements in 6G technology require further security considerations. In earlier networks, authentication schemes were designed to rely on a secure channel between the core network and access points. The 6G network is an open, distributed network that integrates multiple domains and entities and cannot guarantee secure channels in the network. The 6G network requires a new security authentication scheme that applies the zero-trust model. Therefore, this study proposes a zero-trust authentication scheme with access control for 6G-enabled Internet of Things environments. The scheme uses blockchain technology for mutual authentication in a distributed environment and lightweight attribute-based encryption to ensure dynamic access control and network efficiency. This study compares the proposed authentication method with existing methods and demonstrates that this scheme has better performance and security. To the best of our knowledge, this paper is the first to propose a specific authentication protocol with access control considering the zero-trust model in a 6G environment.
引用
收藏
页码:154066 / 154079
页数:14
相关论文
共 50 条
  • [1] Blockchain and 6G-Enabled IoT
    Pajooh, Houshyar Honar
    Demidenko, Serge
    Aslam, Saad
    Harris, Muhammad
    INVENTIONS, 2022, 7 (04)
  • [2] A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
    Li, Siwei
    Zhang, Hui
    Shi, Hui
    Ma, Maode
    Wang, Cong
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (14): : 20682 - 20714
  • [3] Secure and Efficient Message Authentication Scheme for 6G-Enabled VANETs
    Liao, Longxia
    Zhao, Junhui
    Hu, Huanhuan
    Sun, Xiaoke
    ELECTRONICS, 2022, 11 (15)
  • [4] Blockchain Empowered Trustworthy Access Scheme for 6G Zero-trust Vehicular Networks
    Hao Min
    Ye Dongdong
    Yu Rong
    Wang Jingyu
    Liao Jianxin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (09) : 3004 - 3013
  • [5] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [6] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [7] A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
    Song, Yangxu
    Jiang, Frank
    Shah, Syed Wajid Ali
    Doss, Robin
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [8] Joint Design of Multi-Dimensional Multiple Access and Lightweight Continuous Authentication in Zero-Trust Environments
    Fang, He
    Wang, Xianbin
    Al-Dhahir, Naofal
    Schober, Robert
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3366 - 3371
  • [9] 6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles
    Bhattacharya, Pronaya
    Shukla, Arpit
    Tanwar, Sudeep
    Kumar, Neeraj
    Sharma, Ravi
    Computer Communications, 2022, 191 : 53 - 68
  • [10] A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
    Song, Yangxu
    Jiang, Frank
    Ali Shah, Syed Wajid
    Doss, Robin
    2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2022, 2022, : 630 - 636