TY - JOUR
T1 - Zero Trust-Based Mobile Network Security Architecture
AU - Liu, Yiliang
AU - Su, Zhou
AU - Peng, Haixia
AU - Xiang, Yushan
AU - Wang, Wei
AU - Li, Ruidong
N1 - Publisher Copyright:
© 2002-2012 IEEE.
PY - 2024/4/1
Y1 - 2024/4/1
N2 - With the rapid advancement of air interface technology and the exponential growth of mobile services, mobile networks have become significantly complex. Traditional network security models, relying on regional defense strategies, are no longer sufficient to meet the current security demands. This article proposes the zero-trust architecture as a potential security mode for 6G. However, the distributed network architecture, the proliferation of connected devices, and the diverse service requirements of 6G pose sub-stantial challenges to this security model implementation. To address these issues, the article explores the opportunities presented by artificial intelligence (Al) and novel air interface technologies, which promote robust and efficient identity authentication, access control, and confidential data transmission for 6G. Finally, the article outlines a visionary outlook for the zero trust-based 6G security architecture, highlighting its potential impact on the future of mobile networks.
AB - With the rapid advancement of air interface technology and the exponential growth of mobile services, mobile networks have become significantly complex. Traditional network security models, relying on regional defense strategies, are no longer sufficient to meet the current security demands. This article proposes the zero-trust architecture as a potential security mode for 6G. However, the distributed network architecture, the proliferation of connected devices, and the diverse service requirements of 6G pose sub-stantial challenges to this security model implementation. To address these issues, the article explores the opportunities presented by artificial intelligence (Al) and novel air interface technologies, which promote robust and efficient identity authentication, access control, and confidential data transmission for 6G. Finally, the article outlines a visionary outlook for the zero trust-based 6G security architecture, highlighting its potential impact on the future of mobile networks.
UR - https://www.scopus.com/pages/publications/85190836508
U2 - 10.1109/MWC.001.2300375
DO - 10.1109/MWC.001.2300375
M3 - 文章
AN - SCOPUS:85190836508
SN - 1536-1284
VL - 31
SP - 82
EP - 88
JO - IEEE Wireless Communications
JF - IEEE Wireless Communications
IS - 2
ER -