Abstract
The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.
Similar content being viewed by others
Data Availability
Not applicable.
References
Talwar, S., Himayat, N., Nikopour, H., Xue, F., Wu, G., Ilderem, V.: 6g: Connectivity in the era of distributed intelligence. IEEE Commun. Mag. 59(11), 45–50 (2021)
Ramezanpour, K., Jagannath, J.: Intelligent zero trust architecture for 5g/6g networks: Principles, challenges, and the role of machine learning in the context of o-ran. Comput. Netw. 89, 109358 (2022)
Rose, S., Borchert, O., Mitchell, A., Connelly, S.: Zero trust architecture, nist special publication 888-207. NIST, Aug/2020.[online]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP, vol. 800207, (2020)
Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: Zero trust architecture (zta): a comprehensive survey. IEEE Access 10, 143–179 (2022)
Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment. In: 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp. 1–6 (2020)
Chen, X., Feng, W., Ge, N., Zhang, Y.: Zero trust architecture for 6g security. arXiv preprint arXiv:2203.07716 (2022)
Sedjelmaci, H., Ansari, N.: Zero trust architecture empowered attack detection framework to secure 6g edge computing. IEEE Netw. 4, 1–13 (2023)
Bao, S., Sun, W., Xu, H.: A native intelligent and security 6g network architecture. In : 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops). IEEE, pp. 395–400 (2022)
Sedjelmaci, H., Kheir, N., Boudguiga, A., Kaaniche, N.: Cooperative and smart attacks detection systems in 6g-enabled internet of things. In: ICC 2022-IEEE International Conference on Communications. IEEE, pp. 5238–5243 (2022)
Dong, C., Jiang, F., Chen, S., Liu, X.: Continuous authentication for uav delivery systems under zero-trust security framework. In: 2022 IEEE International Conference on Edge Computing and Communications (EDGE). IEEE, pp. 123–132 (2022)
de Figueiredo, F.A.P.: An overview of massive mimo for 5g and 6g. IEEE Latin Am. Trans. 20(6), 1548–10992 (2022)
Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198–208 (1983)
Xu, M., Thai Hoang, D., Kang, J., Niyato, D., Yan, Q., Kim, D.: Secure and reliable transfer learning framework for 6g-enabled internet of vehicles. IEEE Wirel. Commun. 29(4), 132–139 (2022)
Porambage, P., Gür, G., Moya Osorio, D.P., Livanage, M., Ylianttila, M.: 6G security challenges and potential solutions. In: Joint European Conference on Networks and Communications 6G Summit (EuCNC/6G Summit), pp. 622–627 (2021)
Soltani, S., Shojafar, M., Taheri, R., Tafazolli, R.: Can open and ai-enabled 6g ran be secured? IEEE Consum. Electron. Mag. 11(6), 11–12 (2022)
Danish, S.M., Lestas, M., Qureshi, H.K., Zhang, K., Asif, W., Rajarajan, M.: Securing the lorawan join procedure using blockchains. Clust. Comput. 23, 2123–2138 (2020)
Qiang, W., Zhongli, Z.: Reinforcement learning model, algorithms and its application. In: 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC). IEEE, pp. 1143–1146 (2011)
An, L., Chakrabortty, A., Duel-Hallen, A.: A stackelberg security investment game for voltage stability of power systems. In: 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, pp. 3359–3364 (2020)
Schlegl, T., Seeböck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging. Springer, pp. 146–157 (2017)
Raja, G., Senthivel, S.G., Balaganesh, S., Rajakumar, B.R., Ravichandran, V., Guizani, M.: Mlb-iod: multi layered blockchain assisted 6g internet of drones ecosystem. IEEE Trans. Vehic. Technol. 72(2), 2511–2520 (2023)
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (ICISSP)
Sedjelmaci, H., Tourki, K.: A distributed zero trust framework for 6g ran. In: 6TH International Workshop on Intelligent Transportation and Autonomous Vehicles Technologies. IEEE (2013)
Acknowledgements
This work is an extended and enhanced version of the conference paper that has been presented at 6TH IEEE International Workshop on Intelligent Transportation and Autonomous Vehicles Technologies in Florida [23].
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
HS proposed the security concept and written the paper. NK and KT proposed additional ideas and written the paper. All authors reviewed the manuscript. All authors contributed to this work.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Ethical Approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sedjelmaci, H., Kaaniche, N. & Tourki, K. Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. J Netw Syst Manage 32, 33 (2024). https://doi.org/10.1007/s10922-024-09807-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10922-024-09807-x