The emergence of 6G networks is expected to bring forth a host of new technological advancements such as integrated radio systems, further network softwarisation, collaborations across multiple vendors, and artificial intelligence-led network governance. These developments are likely to expand the current scope of security threats by involving additional specialised stakeholders, thus requiring more advanced and multi-layered security measures. In this paper, we present iTrust6G’s multipronged approach for enabling "zero-trust" security for 6G networks. Our approach exploits a multi-faceted trust evaluation accounting for security posture of entities interacting with the network, threat intelligence sharing for fostering collaboration, and security orchestration for maintaining the security stance. A system security architecture is proposed that leverages zero-trust principles to ensure an end-to-end trustworthy 6G system. Furthermore, a set of use-cases serving as evaluation playground for this reference architecture is proposed in the light of the next generation of software networks.

iTrust6G: Zero-Trust Security for 6G Networks / Ghoraishi, M.; Siddiqui, M. S.; Compastie, M.; Mhir, S.; Ntanos, C.; Kontoulis, M.; Lopez, D.; Lioy, A.; Markakis, E. K.; Baskaran, S. B. M.. - STAMPA. - (2024), pp. 411-416. (Intervento presentato al convegno IEEE Future Networks World Forum tenutosi a Dubai (UAE) nel October 15-17, 2024) [10.1109/FNWF63303.2024.11028715].

iTrust6G: Zero-Trust Security for 6G Networks

A. Lioy;
2024

Abstract

The emergence of 6G networks is expected to bring forth a host of new technological advancements such as integrated radio systems, further network softwarisation, collaborations across multiple vendors, and artificial intelligence-led network governance. These developments are likely to expand the current scope of security threats by involving additional specialised stakeholders, thus requiring more advanced and multi-layered security measures. In this paper, we present iTrust6G’s multipronged approach for enabling "zero-trust" security for 6G networks. Our approach exploits a multi-faceted trust evaluation accounting for security posture of entities interacting with the network, threat intelligence sharing for fostering collaboration, and security orchestration for maintaining the security stance. A system security architecture is proposed that leverages zero-trust principles to ensure an end-to-end trustworthy 6G system. Furthermore, a set of use-cases serving as evaluation playground for this reference architecture is proposed in the light of the next generation of software networks.
2024
979-8-3503-7949-5
File in questo prodotto:
File Dimensione Formato  
iTrust6G_Zero-Trust_Security_for_6G_Networks.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 452.79 kB
Formato Adobe PDF
452.79 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2999074