A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

被引:0
|
作者
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Lee, Sangwoo [2 ]
Kwon, Hyeokchan [2 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
6G mobile communication; Authentication; Security; Access control; Internet of Things; Blockchains; Protocols; 5G mobile communication; Drones; Base stations; Encryption; Zero Trust; attribute-based encryption; authentication; blockchain; key agreement; sixth generation (6G); zero-trust; MANAGEMENT; BLOCKCHAIN; PROTOCOL; SECURITY; INTERNET; DESIGN;
D O I
10.1109/ACCESS.2024.3484522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sixth generation (6G) is the next generation of wireless communication technology, is not limited to cellular networks but can be used to provide better services in all areas of wireless communication, including vehicles, drones, and smart homes. However, these advancements in 6G technology require further security considerations. In earlier networks, authentication schemes were designed to rely on a secure channel between the core network and access points. The 6G network is an open, distributed network that integrates multiple domains and entities and cannot guarantee secure channels in the network. The 6G network requires a new security authentication scheme that applies the zero-trust model. Therefore, this study proposes a zero-trust authentication scheme with access control for 6G-enabled Internet of Things environments. The scheme uses blockchain technology for mutual authentication in a distributed environment and lightweight attribute-based encryption to ensure dynamic access control and network efficiency. This study compares the proposed authentication method with existing methods and demonstrates that this scheme has better performance and security. To the best of our knowledge, this paper is the first to propose a specific authentication protocol with access control considering the zero-trust model in a 6G environment.
引用
收藏
页码:154066 / 154079
页数:14
相关论文
共 50 条
  • [21] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [22] Securing the Metaverse: A Blockchain-Enabled Zero-Trust Architecture for Virtual Environments
    Din, Ikram Ud
    Khan, Kamran Habib
    Almogren, Ahmad
    Zareei, Mahdi
    Diaz, Jesus Arturo Perez
    IEEE ACCESS, 2024, 12 : 92337 - 92347
  • [23] Robust Resource Control Based on AP Selection in 6G-Enabled IoT Networks
    Taneja, Ashu
    Alqahtani, Ali
    Saluja, Nitin
    Alqahtani, Nayef
    SENSORS, 2023, 23 (15)
  • [24] A novel zero-trust network access control scheme based on the security profile of devices and users
    Garcia-Teodoro, P.
    Camacho, J.
    Macia-Fernandez, G.
    Gomez-Hernandez, J. A.
    Lopez-Marin, V. J.
    COMPUTER NETWORKS, 2022, 212
  • [25] A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0
    Abuhasel, Khaled Ali
    IEEE ACCESS, 2023, 11 : 116398 - 116409
  • [26] ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT
    Han, Chenchen
    Kim, Gwang-Jun
    Alfarraj, Osama
    Tolba, Amr
    Ren, Yongjun
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 289 - 295
  • [27] A Blockchain Empowered Smart Home Access Scheme Based on Zero-trust Architecture
    Liu, Peng
    Xu, Yinghui
    Wang, Yanqing
    Fan, Ping
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 43 - 49
  • [28] An Edge Zero-Trust Model Against Compromised Terminals Threats in Power IoT Environments
    Feng J.
    Yu T.
    Wang Z.
    Zhang W.
    Han G.
    Huang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1120 - 1132
  • [29] Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams
    Sasada, Taisho
    Masuda, Yuto
    Taenaka, Yuzo
    Kadobayashi, Youki
    Fall, Doudou
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 24 - 31
  • [30] A Human-Machine Interaction Scheme Based on Background Knowledge in 6G-Enabled IoT Environment
    Yuan, Yiming
    Cai, Xiantao
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20) : 15292 - 15302