{"title":"面向6G安全物联网通信的自适应信任架构","authors":"Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula","doi":"10.1109/LNET.2025.3566909","DOIUrl":null,"url":null,"abstract":"This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"113-116"},"PeriodicalIF":0.0000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10985891","citationCount":"0","resultStr":"{\"title\":\"Adaptive Trust Architecture for Secure IoT Communication in 6G\",\"authors\":\"Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula\",\"doi\":\"10.1109/LNET.2025.3566909\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.\",\"PeriodicalId\":100628,\"journal\":{\"name\":\"IEEE Networking Letters\",\"volume\":\"7 2\",\"pages\":\"113-116\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2025-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10985891\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Networking Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10985891/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Networking Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10985891/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Trust Architecture for Secure IoT Communication in 6G
This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.