Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0009-0007-1704-1852
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-0244-3561
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0002-4031-2872
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0001-8561-7963
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 94753-94764Article in journal (Refereed) Published
Abstract [en]

As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks include a broader array of devices and sensors compared to earlier generations, increasing the potential for attackers to exploit weaknesses. Existing security frameworks contribute to safeguarding enterprises against external threats that originate beyond the network perimeter. These frameworks operate under the assumption that all entities inside the defined perimeters are reliable, and their primary objective is to authorize access to resources based on assigned roles and permissions. However, this strategy could be more effective today since attacks might originate from any source, including within the network perimeter. To address this issue, a zero-trust architecture (ZTA) could be a potential solution that assumes neither users nor devices can be inherently trusted, and it consistently evaluates potential risks to decide whether to allow access to resources. This article will explore the zero-trust approach and its significance in contemporary network security. We describe the role of authentication and access control in ZTA and present an in-depth discussion of state-of-the-art authentication and access control techniques in different scenarios. This article examines the applicability of the zero-trust concept in 6G networks and analyzes the associated challenges and opportunities. This article also examines case studies demonstrating the practical application of the zero trust paradigm in 6G or comparable networks. It explores the research scope and tries to identify relevant research gaps in this area.

Place, publisher, year, edition, pages
IEEE, 2024. Vol. 12, p. 94753-94764
Keywords [en]
6G mobile communication, 6G networks, Authentication, Computer architecture, Multi-factor authentication, Network security, Perimeter-based security, Security, Surveys, Zero Trust, Zero-trust architecture
National Category
Communication Systems Information Systems Telecommunications
Research subject
Cyber Security; Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-108410DOI: 10.1109/ACCESS.2024.3425350ISI: 001272140400001Scopus ID: 2-s2.0-85198311694OAI: oai:DiVA.org:ltu-108410DiVA, id: diva2:1885822
Funder
Interreg Aurora, 20357901
Note

Validerad;2024;Nivå 2;2024-07-25 (signyg);

Fulltext license: CC BY-NC-ND

Available from: 2024-07-25 Created: 2024-07-25 Last updated: 2024-11-20Bibliographically approved

Open Access in DiVA

fulltext(1041 kB)241 downloads
File information
File name FULLTEXT01.pdfFile size 1041 kBChecksum SHA-512
619d221c5dd1d97bdff80d8a4187f8abe9a7fb9031f795b87cd8058edb22a7c16e95cae1ebb22606a29b82e1dfdc44b7e3714339c55e7e9bc37a3cfd53c9f442
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Nahar, NurunAndersson, KarlSchelén, OlovSaguna, Saguna

Search in DiVA

By author/editor
Nahar, NurunAndersson, KarlSchelén, OlovSaguna, Saguna
By organisation
Computer Science
In the same journal
IEEE Access
Communication SystemsInformation SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 241 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 492 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf