The emergence of 6G networks is expected to bring forth a host of new technological advancements such as integrated radio systems, further network softwarisation, collaborations across multiple vendors, and artificial intelligence-led network governance. These developments are likely to expand the current scope of security threats by involving additional specialised stakeholders, thus requiring more advanced and multi-layered security measures. In this paper, we present iTrust6G’s multipronged approach for enabling "zero-trust" security for 6G networks. Our approach exploits a multi-faceted trust evaluation accounting for security posture of entities interacting with the network, threat intelligence sharing for fostering collaboration, and security orchestration for maintaining the security stance. A system security architecture is proposed that leverages zero-trust principles to ensure an end-to-end trustworthy 6G system. Furthermore, a set of use-cases serving as evaluation playground for this reference architecture is proposed in the light of the next generation of software networks.
iTrust6G: Zero-Trust Security for 6G Networks / Ghoraishi, M.; Siddiqui, M. S.; Compastie, M.; Mhir, S.; Ntanos, C.; Kontoulis, M.; Lopez, D.; Lioy, A.; Markakis, E. K.; Baskaran, S. B. M.. - STAMPA. - (2024), pp. 411-416. (Intervento presentato al convegno IEEE Future Networks World Forum tenutosi a Dubai (UAE) nel October 15-17, 2024) [10.1109/FNWF63303.2024.11028715].
iTrust6G: Zero-Trust Security for 6G Networks
A. Lioy;
2024
Abstract
The emergence of 6G networks is expected to bring forth a host of new technological advancements such as integrated radio systems, further network softwarisation, collaborations across multiple vendors, and artificial intelligence-led network governance. These developments are likely to expand the current scope of security threats by involving additional specialised stakeholders, thus requiring more advanced and multi-layered security measures. In this paper, we present iTrust6G’s multipronged approach for enabling "zero-trust" security for 6G networks. Our approach exploits a multi-faceted trust evaluation accounting for security posture of entities interacting with the network, threat intelligence sharing for fostering collaboration, and security orchestration for maintaining the security stance. A system security architecture is proposed that leverages zero-trust principles to ensure an end-to-end trustworthy 6G system. Furthermore, a set of use-cases serving as evaluation playground for this reference architecture is proposed in the light of the next generation of software networks.File | Dimensione | Formato | |
---|---|---|---|
iTrust6G_Zero-Trust_Security_for_6G_Networks.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
452.79 kB
Formato
Adobe PDF
|
452.79 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2999074