2022
DOI: 10.48550/arxiv.2203.07716
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Zero Trust Architecture for 6G Security

Abstract: The upcoming sixth generation (6G) network is envisioned to be more open and heterogeneous than earlier generations. This challenges conventional security architectures, which typically rely on the construction of a security perimeter at network boundaries. In this article, we propose a softwaredefined zero trust architecture (ZTA) for 6G networks, which is promising for establishing an elastic and scalable security regime. This architecture achieves secure access control through adaptive collaborations among … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…In [15], a novel ZT aligned method for detecting run-time Trojans in untrusted commercial off-the-shelf (COTS) processors is provided. A software-defined ZT architecture for sixth generation (6G) networks is proposed in [24], which has the potential to establish a flexible and scalable security framework. This architecture relies on adaptive collaboration among control domains to enable secure access control, and it provides effective protection against malicious access behaviors, including distributed denial of service (DDoS) attacks, malware propagation, and zero-day exploits.…”
Section: Malware and Trojan Detectionmentioning
confidence: 99%
“…In [15], a novel ZT aligned method for detecting run-time Trojans in untrusted commercial off-the-shelf (COTS) processors is provided. A software-defined ZT architecture for sixth generation (6G) networks is proposed in [24], which has the potential to establish a flexible and scalable security framework. This architecture relies on adaptive collaboration among control domains to enable secure access control, and it provides effective protection against malicious access behaviors, including distributed denial of service (DDoS) attacks, malware propagation, and zero-day exploits.…”
Section: Malware and Trojan Detectionmentioning
confidence: 99%