{"title":"Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture","authors":"","doi":"10.1007/s10922-024-09807-x","DOIUrl":null,"url":null,"abstract":"<h3>Abstract</h3> <p>The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"99 1","pages":""},"PeriodicalIF":4.1000,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Systems Management","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10922-024-09807-x","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.
摘要 正如关键性能指标(KPI)所显示的那样,由于对虚拟化的需求日益增长,即将到来的第六代(6 G)网络面临着巨大的安全挑战。为了确保这种分布式网络的通信保密性,我们提出了一种智能零信任(ZT)框架,以保护无线接入网(RAN)免受潜在威胁。我们提出的零信任模型是专门针对 6 G 网络的分布式特性而设计的。它在基站、核心网络和云等不同节点中安装了保密模块,以监控网络,同时执行分层和分布式威胁检测。这种方法使分布式模块能够协同工作,有效地识别和应对可疑的 RAN 威胁。作为一个 RAN 安全用例,我们解决了支持 6 G 的无人机互联网的入侵检测问题。我们的仿真结果表明,我们基于分布式安全模块的 ZT 框架对潜在攻击具有鲁棒性。该框架检测时间短,误报率低,是保护 6 G 网络安全的可靠解决方案。此外,ZT 模型还能在不同节点中容纳保密模块,并在网络中提供所需的增强安全措施。
期刊介绍:
Journal of Network and Systems Management, features peer-reviewed original research, as well as case studies in the fields of network and system management. The journal regularly disseminates significant new information on both the telecommunications and computing aspects of these fields, as well as their evolution and emerging integration. This outstanding quarterly covers architecture, analysis, design, software, standards, and migration issues related to the operation, management, and control of distributed systems and communication networks for voice, data, video, and networked computing.