Skip to main content
Log in

Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

The upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed network, we propose an intelligent zero trust (ZT) framework that safeguards the radio access network (RAN) from potential threats. Our proposed ZT model is specifically designed to cater to the distributed nature of 6 G networks. It accommodates secrecy modules in various nodes, such as the base station, core network, and cloud, to monitor the network while performing hierarchical and distributed threat detection. This approach enables the distributed modules to work together to efficiently identify and respond to the suspected RAN threats. As a RAN security use case, we address the intrusion detection issues of the 6 G-enabled internet of drones. Our simulation results show the robustness of our ZT framework, which is based on distributed security modules, against potential attacks. The framework exhibits low detection time and low false positives, making it a reliable solution for securing 6 G networks. Furthermore, the ZT model enables the accommodation of secrecy modules in various nodes and provides the needed enhanced security measures in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Talwar, S., Himayat, N., Nikopour, H., Xue, F., Wu, G., Ilderem, V.: 6g: Connectivity in the era of distributed intelligence. IEEE Commun. Mag. 59(11), 45–50 (2021)

    Article  Google Scholar 

  2. Ramezanpour, K., Jagannath, J.: Intelligent zero trust architecture for 5g/6g networks: Principles, challenges, and the role of machine learning in the context of o-ran. Comput. Netw. 89, 109358 (2022)

    Article  Google Scholar 

  3. Rose, S., Borchert, O., Mitchell, A., Connelly, S.: Zero trust architecture, nist special publication 888-207. NIST, Aug/2020.[online]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP, vol. 800207, (2020)

  4. Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: Zero trust architecture (zta): a comprehensive survey. IEEE Access 10, 143–179 (2022)

    Article  Google Scholar 

  5. Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment. In: 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, pp. 1–6 (2020)

  6. Chen, X., Feng, W., Ge, N., Zhang, Y.: Zero trust architecture for 6g security. arXiv preprint arXiv:2203.07716 (2022)

  7. Sedjelmaci, H., Ansari, N.: Zero trust architecture empowered attack detection framework to secure 6g edge computing. IEEE Netw. 4, 1–13 (2023)

    Google Scholar 

  8. Bao, S., Sun, W., Xu, H.: A native intelligent and security 6g network architecture. In : 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops). IEEE, pp. 395–400 (2022)

  9. Sedjelmaci, H., Kheir, N., Boudguiga, A., Kaaniche, N.: Cooperative and smart attacks detection systems in 6g-enabled internet of things. In: ICC 2022-IEEE International Conference on Communications. IEEE, pp. 5238–5243 (2022)

  10. Dong, C., Jiang, F., Chen, S., Liu, X.: Continuous authentication for uav delivery systems under zero-trust security framework. In: 2022 IEEE International Conference on Edge Computing and Communications (EDGE). IEEE, pp. 123–132 (2022)

  11. de Figueiredo, F.A.P.: An overview of massive mimo for 5g and 6g. IEEE Latin Am. Trans. 20(6), 1548–10992 (2022)

    Google Scholar 

  12. Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018)

    Article  Google Scholar 

  13. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  14. Xu, M., Thai Hoang, D., Kang, J., Niyato, D., Yan, Q., Kim, D.: Secure and reliable transfer learning framework for 6g-enabled internet of vehicles. IEEE Wirel. Commun. 29(4), 132–139 (2022)

    Article  Google Scholar 

  15. Porambage, P., Gür, G., Moya Osorio, D.P., Livanage, M., Ylianttila, M.: 6G security challenges and potential solutions. In: Joint European Conference on Networks and Communications 6G Summit (EuCNC/6G Summit), pp. 622–627 (2021)

  16. Soltani, S., Shojafar, M., Taheri, R., Tafazolli, R.: Can open and ai-enabled 6g ran be secured? IEEE Consum. Electron. Mag. 11(6), 11–12 (2022)

    Article  Google Scholar 

  17. Danish, S.M., Lestas, M., Qureshi, H.K., Zhang, K., Asif, W., Rajarajan, M.: Securing the lorawan join procedure using blockchains. Clust. Comput. 23, 2123–2138 (2020)

    Article  Google Scholar 

  18. Qiang, W., Zhongli, Z.: Reinforcement learning model, algorithms and its application. In: 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC). IEEE, pp. 1143–1146 (2011)

  19. An, L., Chakrabortty, A., Duel-Hallen, A.: A stackelberg security investment game for voltage stability of power systems. In: 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, pp. 3359–3364 (2020)

  20. Schlegl, T., Seeböck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging. Springer, pp. 146–157 (2017)

  21. Raja, G., Senthivel, S.G., Balaganesh, S., Rajakumar, B.R., Ravichandran, V., Guizani, M.: Mlb-iod: multi layered blockchain assisted 6g internet of drones ecosystem. IEEE Trans. Vehic. Technol. 72(2), 2511–2520 (2023)

    Article  Google Scholar 

  22. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (ICISSP)

  23. Sedjelmaci, H., Tourki, K.: A distributed zero trust framework for 6g ran. In: 6TH International Workshop on Intelligent Transportation and Autonomous Vehicles Technologies. IEEE (2013)

Download references

Acknowledgements

This work is an extended and enhanced version of the conference paper that has been presented at 6TH IEEE International Workshop on Intelligent Transportation and Autonomous Vehicles Technologies in Florida [23].

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

HS proposed the security concept and written the paper. NK and KT proposed additional ideas and written the paper. All authors reviewed the manuscript. All authors contributed to this work.

Corresponding author

Correspondence to Hichem Sedjelmaci.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sedjelmaci, H., Kaaniche, N. & Tourki, K. Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. J Netw Syst Manage 32, 33 (2024). https://doi.org/10.1007/s10922-024-09807-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-024-09807-x

Keywords

Navigation