Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement

被引:0
|
作者
Spanier, Adam [1 ]
Zhao, Rui [1 ]
Huang, Pei-Chi [2 ]
机构
[1] Univ Nebraska, Sch Interdisciplinary Informat, Omaha, NE 68182 USA
[2] Univ Nebraska, Dept Comp Sci, Omaha, NE 68182 USA
关键词
Zero-trust; Authentication; Security; Blockchain;
D O I
10.1109/TrustCom60117.2023.00207
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Zero trust networks have emerged as a promising solution to assure comprehensive security in network environments. Different from the traditional perimeter-based security approach, zero trust networks provide a robust and adaptable security framework which addresses the evolving threat landscape and enables organizations to protect their critical assets with a higher assurance of confidence. However, the centralized policy engine employed in current zero trust architectures (ZTA) would introduce bottlenecks and single points of failure (SPoF) for ZTA-based networks, thus hindering the scalability and efficiency as network size increases. This paper introduces a novel decentralized host-to-host authentication schema that enables consistent policy engine decisions in a pair-wise manner. By decentralizing the authentication process, the proposed schema effectively eliminates bottlenecks and single points of failure associated with centralized policy engines. The system incorporates a decentralized authentication ledger and a policy validation protocol to ensure the correct and consistent authentication across all network hosts. Through comprehensive tests and simulations, we compared our proposed novel model with the traditional zero trust network, in terms of the correctness, time complexity, and efficiency. Our findings demonstrate the advantages of our decentralized approach and its potential for enhancing security in zero trust networks.
引用
收藏
页码:1518 / 1523
页数:6
相关论文
共 21 条
  • [1] Decentralized Policy Enforcement in Zero Trust Architectures
    Creutz, Lars
    Dartmann, Guido
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [2] Access Control Policy Enforcement for Zero-Trust-Networking
    Vanickis, Romans
    Jacob, Paul
    Dehghanzadeh, Sohelia
    Lee, Brian
    2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,
  • [3] Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV
    Fang, He
    Zhu, Yongxu
    Zhang, Yan
    Wang, Xianbin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (08) : 8760 - 8772
  • [4] Securing the Shell - Implementing a Host Level Default Deny Policy
    Boeckman, Chuck
    Buchanan, Mark
    Information Security Technical Report, 2002, 7 (01): : 57 - 62
  • [5] Decentralized Device Authentication Model using the Trust Score and Blockchain Technology for Dynamic Networks
    Subramanian, Venkatesan
    Rajendra, Yuvaraj
    Sahai, Shubham
    Shukla, Sandeep K.
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 116 - 125
  • [6] Blockchain enabled zero trust based authentication scheme for railway communication networks
    Yuan Feng
    Zhangdui Zhong
    Xiaofang Sun
    Lei Wang
    Yunlong Lu
    Yongsheng Zhu
    Journal of Cloud Computing, 12
  • [7] Blockchain enabled zero trust based authentication scheme for railway communication networks
    Feng, Yuan
    Zhong, Zhangdui
    Sun, Xiaofang
    Wang, Lei
    Lu, Yunlong
    Zhu, Yongsheng
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [8] Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks
    Ge, Yunfei
    Zhu, Quanyan
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 359 - 364
  • [9] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Hichem Sedjelmaci
    Nesrine Kaaniche
    Kamel Tourki
    Journal of Network and Systems Management, 2024, 32
  • [10] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Sedjelmaci, Hichem
    Kaaniche, Nesrine
    Tourki, Kamel
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)